2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 32905-2016
GB/T 32905-2016   Information security technology SM3 cryptographic hash algorithm (English Version)
Standard No.: GB/T 32905-2016 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 8500 words Translation Price(USD):240.0 remind me the price change

Email:

Implemented on:2017-3-1 Delivery: via email in 1 business day

→ → →

,,2017-3-1,3A91FE7469E0A2DB1474615003231
Standard No.: GB/T 32905-2016
English Name: Information security technology SM3 cryptographic hash algorithm
Chinese Name: 信息安全技术 SM3密码杂凑算法
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2016-08-29
Implemented on: 2017-3-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 8500 words
Translation Price(USD): 240.0
Delivery: via email in 1 business day
This standard is developed in accordance with the rules given in GB/T 1.1-2009. This part was proposed by the State Cryptography Administration of the People’s Republic of China. This part is under the jurisdiction of SAC/TC 260 National Technical Committee on Information Technology Security of Standardization Administration of China. Drafting organizations of this part: Tsinghua University, State Commercial Cryptography Testing Center, Information Engineering University, DCS Center of Chinese Academy of Sciences. Chief drafting staff of this part: Wang Xiaoyun, Li Zheng, Wang Yongchuan, Yu Hongbo, Xie Yongquan, Zhang Chao, Luo Peng, Lv Shuwang Information security techniques - SM3 cryptographic hash algorithm 1 Scope This standard specifies computing methods and steps of SM3 cryptographic hash algorithm and corresponding operation examples. It is applicable to digital signature and verification, generation and verification of message authentication code and random number generation in commercial cypher application, which can meet the security requirements of various cryptography applications. 2 Terms and definitions For the purposes of this document, the following terms and definitions apply. 2.1 bit string binary digit sequence composed of 0 and 1 2.2 big-endian a representation format of data in memory, specifying the high significant bit at left and the low significant bit at right, i.e. high order byte of digit is placed at the low address of reservoir and low order byte of digit at the high address of reservoir 2.3 message a bit string with any finite length, used as input data for the hash algorithm in this standard 2.4 hash value output message digest (bit string) when hash algorithm works on a message 2.5 word set (string) with length of 32-bit 3 Symbols For the purposes of this document, the following symbol applies. ABCDEFGH: registers of 8 words or concatenation of their values B(i): the ith message grouping CF: the compression function FFj: the Boolean function, different equations are taken depending on j GGj: the Boolean function, different equations are taken depending on j IV: the initial value, used to determine the initial state of the compression function register P0: the permutation function in compression function P1: the permutation function in message extension Tj: the constant, different values are taken depending on j m: the message m': the message after filling mod: the modulo operation n: the number of message grouping ∧: 32 bits and operation ∨: 32 bits or operation ⊕: 32 bits exclusive-or operation ¬: 32 bits non-operation +: mod 232 addition arithmetic operation <<
Foreword i 1 Scope 2 Terms and definitions 3 Symbols 4 Constant and functions 4.1 Initial value 4.2 Constant 4.3 Boolean function 4.4 Permutation function 5 Algorithm description 5.1 General 5.2 Filling 5.3 Iterative compression 5.4 Outputting hash value Annex A (Informative) Operation examples
Referred in GB/T 32905-2016:
*GB/T 32879-2016 General technical requirements for battery box connectors for replacement of electric vehicles
*JTG/T D21-2014 Guidelines for Design of Highway Grade-separated Intersections
*GB/T 32420-2015 Specification for testing of wireless local area network
*DL/T 905-2016 Code of repair welding for blade of steam turbine and runner of hydroturbine
*NB/T 47013.14-2016 Nondestructive testing of pressure equipments Part 14: X-ray Computed radiographic testing
*NB/T 42082-2016 Vanadium flow battery-test method for electrode
*NB/T 42081-2016 Vanadium flow battery-Test Method for single cell performance
*NB/T 42080-2016 Ion conductive membrane for Vanadium flow battery-Test method
*NB/T 42077-2016 In-cable Control and Protective Device for Mode 2 Charging of Electric Road Vehicles (IC-CPD)
*GB 1886.170-2016 National Food Safety Standard - Food Additives - 5'-guanylate disodium
*GB 1903.5-2016 National Food Safety Standard - Food Nutrition Enhancer - 5-cytidine disodium
*GB 1886.25-2016 National Food Safety Standard - Food Additives - Sodium Citrate
*GB 1886.20-2016 National Food Safety Standard - Food Additives - Sodium Hydroxide
*GB 1886.3-2016 National Food Safety Standard - Food Additives - DCP
GB/T 32905-2016 is referred in:
*GB/T 32918.5-2017 Information security technology―Public key cryptographic algorithm SM2 based on elliptic curves―Part 5:Parameter definition
*GB/T 37092-2018 Information security technology-Security requirements for cryptographic modules
*GB/T 19056-2021 Vehicle travelling data recorder
*JR/T 0156-2017 Mobile Terminal Payment Trusted Environment Specification (Draft for Approval)
*YD/T 3957-2021 LTE-based vehicular communication ——Technical requirement of security certificate management system
*GB/T 41389-2022 Information security technology—SM9 cryptographic algorithm application specification
*GB/T 38635.1-2020 Information security technology—Identity-based cryptographic algorithms SM9—Part 1:General
*GB/T 38635.2-2020 Information security technology—Identity-based cryptographic algorithms SM9—Part 2:Algorithms
*GB/T 32918.3-2016 Information security techniques - Elliptic Curve public - key cryptography - Part 3: Key exchange protocol
*GB/T 32918.2-2016 Elliptic Curve Public - Key Cryptography Part 2: Digital Signature Algorithm
*GB/T 6556-2016 Type, main dimensions, material and identification of mechanical seals
*GB/T 4502-2016 Laboratory test methods for passenger car tyres capabilities
*GB/T 3952-2016 Copper drawing stock for electrical purpose
*GB/T 2977-2016 Size designation,dimensions,inflation pressure and load capacity for truck tyres
*GB/T 32907-2016 Information security techno1ogy--SM4 b1ock cipher algorithm
*GM/T 0131-2023 Electronic seal signature application interface specification
*GM/T 0105-2021 Design guide for software-based random number generators
*GM/T 0127-2023 Mobile terminal cryptographic module application interface specification
*GB/T 45112-2024 LTE-based vehicular communication—Technical requirement of security certificate management system
Code of China
Standard
GB/T 32905-2016  Information security technology SM3 cryptographic hash algorithm (English Version)
Standard No.GB/T 32905-2016
Statusvalid
LanguageEnglish
File FormatPDF
Word Count8500 words
Price(USD)240.0
Implemented on2017-3-1
Deliveryvia email in 1 business day
Detail of GB/T 32905-2016
Standard No.
GB/T 32905-2016
English Name
Information security technology SM3 cryptographic hash algorithm
Chinese Name
信息安全技术 SM3密码杂凑算法
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2016-08-29
Implemented on
2017-3-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
8500 words
Price(USD)
240.0
Keywords
GB/T 32905-2016, GB 32905-2016, GBT 32905-2016, GB/T32905-2016, GB/T 32905, GB/T32905, GB32905-2016, GB 32905, GB32905, GBT32905-2016, GBT 32905, GBT32905
Introduction of GB/T 32905-2016
This standard is developed in accordance with the rules given in GB/T 1.1-2009. This part was proposed by the State Cryptography Administration of the People’s Republic of China. This part is under the jurisdiction of SAC/TC 260 National Technical Committee on Information Technology Security of Standardization Administration of China. Drafting organizations of this part: Tsinghua University, State Commercial Cryptography Testing Center, Information Engineering University, DCS Center of Chinese Academy of Sciences. Chief drafting staff of this part: Wang Xiaoyun, Li Zheng, Wang Yongchuan, Yu Hongbo, Xie Yongquan, Zhang Chao, Luo Peng, Lv Shuwang Information security techniques - SM3 cryptographic hash algorithm 1 Scope This standard specifies computing methods and steps of SM3 cryptographic hash algorithm and corresponding operation examples. It is applicable to digital signature and verification, generation and verification of message authentication code and random number generation in commercial cypher application, which can meet the security requirements of various cryptography applications. 2 Terms and definitions For the purposes of this document, the following terms and definitions apply. 2.1 bit string binary digit sequence composed of 0 and 1 2.2 big-endian a representation format of data in memory, specifying the high significant bit at left and the low significant bit at right, i.e. high order byte of digit is placed at the low address of reservoir and low order byte of digit at the high address of reservoir 2.3 message a bit string with any finite length, used as input data for the hash algorithm in this standard 2.4 hash value output message digest (bit string) when hash algorithm works on a message 2.5 word set (string) with length of 32-bit 3 Symbols For the purposes of this document, the following symbol applies. ABCDEFGH: registers of 8 words or concatenation of their values B(i): the ith message grouping CF: the compression function FFj: the Boolean function, different equations are taken depending on j GGj: the Boolean function, different equations are taken depending on j IV: the initial value, used to determine the initial state of the compression function register P0: the permutation function in compression function P1: the permutation function in message extension Tj: the constant, different values are taken depending on j m: the message m': the message after filling mod: the modulo operation n: the number of message grouping ∧: 32 bits and operation ∨: 32 bits or operation ⊕: 32 bits exclusive-or operation ¬: 32 bits non-operation +: mod 232 addition arithmetic operation <<
Contents of GB/T 32905-2016
Foreword i 1 Scope 2 Terms and definitions 3 Symbols 4 Constant and functions 4.1 Initial value 4.2 Constant 4.3 Boolean function 4.4 Permutation function 5 Algorithm description 5.1 General 5.2 Filling 5.3 Iterative compression 5.4 Outputting hash value Annex A (Informative) Operation examples
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 32905-2016, GB 32905-2016, GBT 32905-2016, GB/T32905-2016, GB/T 32905, GB/T32905, GB32905-2016, GB 32905, GB32905, GBT32905-2016, GBT 32905, GBT32905