| GM/T 0004-2012 PDF EnglishUS$160.00 · In stock · Download in 9 secondsGM/T 0004-2012: SM3 cryptographic hash algorithmDelivery: 9 seconds.  True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Obsolete  
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |  
			| GM/T 0004-2012 | English | 160 | Add to Cart | 0-9 seconds. Auto-delivery | SM3 cryptographic hash algorithm | Obsolete |  
	  
       Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0004-2012
 
 GM/T 0004-2012: SM3 cryptographic hash algorithm---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0004-2012GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
RECORD NO.. 36831-2012
SM3 cryptography hash algorithm
Issued on: MARCH 21, 2012
Implemented on: MARCH 21, 2012
Issued by. State Cryptography Administration of the People’s Republic of
China
 Table of ContentsForeword ... 3
1 Scope .. 4
2 Terms and conventions ... 4
3 Symbols ... 5
4 Constants and functions .. 6
4.1 Initial value .. 6
4.2 Constant ... 6
4.3 Boolean function ... 6
4.4 Permutation function ... 6
5 Description of algorithm ... 6
5.1 Overview .. 6
5.2 Populating ... 6
5.3 Iterative compression ... 7
5.4 Hash value .. 8
Annex A (Informative) Examples of operation .. 9
A.1 Example 1 ... 9
A.2 Example 2 .. 11ForewordThis Standard is drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document
may be the subject of patent rights. The issuer of this document shall not be
held responsible for identifying any or all such patent rights.
Annex A to this Standard is informative.
This Standard was proposed by and shall be under the jurisdiction of the State
Cryptography Administration.
The drafting organizations of this Standard. Tsinghua University, State
Cryptography Administration Commercial Cryptography Testing Center, PLA
Information Engineering University, The Data Assurance and Communication
Security Research Center of Chinese Academy of Sciences.
The main drafters of this Standard. Wang Xiaoyun, Li Zheng, Yu Hongbo,
Zhang Chao, Luo Peng, Lv Shuwang.
SM3 cryptography hash algorithm1 ScopeThis Standard specifies the calculation method and calculation procedures of
SM3 cryptography hash algorithm; and gives operational examples.
This Standard applies to the digital signature-verification in commercial
cryptography applications, the generation-verification of message
authentication codes, and the generation of random numbers, which can satisfy
the security requirements for multiple cryptography applications. Meanwhile,
this Standard can also provide security product manufacturers with standard
positioning for products and technologies as well as references for
standardization, so as to improve the creditability and interoperability of security
products.2 Terms and conventionsFor the purposes of this document, the following terms and definitions apply.
2.1
bit string
Digital sequence of binary number 0 or 1.
2.2
big-endian
A representation format of data in memory, whose significant bits are specified
to be on the left and less significant bits on the right. The high-order bytes of
numbers are placed at lower addresses of memory while the low-order bytes of
numbers are placed at high addresses of memory.
2.3
message
Bit string of random finite length. Message in this Standard is deemed as the
input data of hash algorithm.
2.4
hash value
Message digest (bit string) output when hash algorithm acts on a message.
2.5
word
Group (string) which is 32 bits long.3 SymbolsFor the purposes of this Standard, the following symbols apply.
ABCDEFGH. 8-word register or series of their values
B(i). the i-th message group
CF. compression function
FFj.
boolean function, which is expressed according to the change of
GGj.
boolean function, which is expressed according to the change of
IV.
Initial value, which is used to determine the initial state of
compression function register
P0. permutation function in compression function
P1. permutation function in message extension
Tj. algorithmic constant
m. message
m'. populated message
mod. modulo operation
n. number of message groups
32-bit AND operation
32-bit OR operation
32-bit exclusive-OR operation
32-bit NOT operation
mod-232-bit arithmetic additive operation
32-bit ring shift left operation by k bits
Left assignment operator
5.3 Iterative compression
5.3.1 Iteration process
Divide the populated message m’ into groups by 512 bits.
where .
Iterate m’ as follows.
where CF is compression function, V(0) is 256-bit initial value IV, B(i) is populated
message group and the result of iterative compression is V (n).
5.3.2 Message extension
Extent the message group B(i) to generate 132 message words as follows, i.e.
W0, W1, ., W67, W’0, W’1, . W’63, for compression function CF.
a) divide the message group B(i) into 16 words, i.e. W0, W1, ., W15.
5.3.3 Compression function
Let A, B, C, D, E, F, G and H be word registers, SS1, SS2, TT1 and TT2
intermediate variables, and compression function V(i+1) = CF (V(i), B(i)) (0 ≤ i ≤ n-
1). The calculation process is described as follows.
123 bits 64 bits
Binary representation of l
......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
 
 Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0004-2012 be delivered?Answer: The full copy PDF of English version of GM/T 0004-2012 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0004-2012_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0004-2012_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries Question 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0004-2012  -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GM/T 0004-2012?A step-by-step guide to download PDF of GM/T 0004-2012_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GM/T 0004-2012".
 Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
 Step 4: Select payment option (Via payment agents Stripe or PayPal).
 Step 5: Customize Tax Invoice -- Fill up your email etc.
 Step 6: Click "Checkout".
 Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
 Step 8: Optional -- Go to download PDF.
 Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
 See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9
      |