GM/T 0004-2012 PDF EnglishUS$160.00 · In stock · Download in 9 seconds
GM/T 0004-2012: SM3 cryptographic hash algorithm Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Obsolete
Similar standardsGM/T 0004-2012: SM3 cryptographic hash algorithm---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0004-2012GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 RECORD NO.. 36831-2012 SM3 cryptography hash algorithm Issued on: MARCH 21, 2012 Implemented on: MARCH 21, 2012 Issued by. State Cryptography Administration of the People’s Republic of China Table of ContentsForeword ... 3 1 Scope .. 4 2 Terms and conventions ... 4 3 Symbols ... 5 4 Constants and functions .. 6 4.1 Initial value .. 6 4.2 Constant ... 6 4.3 Boolean function ... 6 4.4 Permutation function ... 6 5 Description of algorithm ... 6 5.1 Overview .. 6 5.2 Populating ... 6 5.3 Iterative compression ... 7 5.4 Hash value .. 8 Annex A (Informative) Examples of operation .. 9 A.1 Example 1 ... 9 A.2 Example 2 .. 11ForewordThis Standard is drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuer of this document shall not be held responsible for identifying any or all such patent rights. Annex A to this Standard is informative. This Standard was proposed by and shall be under the jurisdiction of the State Cryptography Administration. The drafting organizations of this Standard. Tsinghua University, State Cryptography Administration Commercial Cryptography Testing Center, PLA Information Engineering University, The Data Assurance and Communication Security Research Center of Chinese Academy of Sciences. The main drafters of this Standard. Wang Xiaoyun, Li Zheng, Yu Hongbo, Zhang Chao, Luo Peng, Lv Shuwang. SM3 cryptography hash algorithm1 ScopeThis Standard specifies the calculation method and calculation procedures of SM3 cryptography hash algorithm; and gives operational examples. This Standard applies to the digital signature-verification in commercial cryptography applications, the generation-verification of message authentication codes, and the generation of random numbers, which can satisfy the security requirements for multiple cryptography applications. Meanwhile, this Standard can also provide security product manufacturers with standard positioning for products and technologies as well as references for standardization, so as to improve the creditability and interoperability of security products.2 Terms and conventionsFor the purposes of this document, the following terms and definitions apply. 2.1 bit string Digital sequence of binary number 0 or 1. 2.2 big-endian A representation format of data in memory, whose significant bits are specified to be on the left and less significant bits on the right. The high-order bytes of numbers are placed at lower addresses of memory while the low-order bytes of numbers are placed at high addresses of memory. 2.3 message Bit string of random finite length. Message in this Standard is deemed as the input data of hash algorithm. 2.4 hash value Message digest (bit string) output when hash algorithm acts on a message. 2.5 word Group (string) which is 32 bits long.3 SymbolsFor the purposes of this Standard, the following symbols apply. ABCDEFGH. 8-word register or series of their values B(i). the i-th message group CF. compression function FFj. boolean function, which is expressed according to the change of GGj. boolean function, which is expressed according to the change of IV. Initial value, which is used to determine the initial state of compression function register P0. permutation function in compression function P1. permutation function in message extension Tj. algorithmic constant m. message m'. populated message mod. modulo operation n. number of message groups 32-bit AND operation 32-bit OR operation 32-bit exclusive-OR operation 32-bit NOT operation mod-232-bit arithmetic additive operation 32-bit ring shift left operation by k bits Left assignment operator 5.3 Iterative compression 5.3.1 Iteration process Divide the populated message m’ into groups by 512 bits. where . Iterate m’ as follows. where CF is compression function, V(0) is 256-bit initial value IV, B(i) is populated message group and the result of iterative compression is V (n). 5.3.2 Message extension Extent the message group B(i) to generate 132 message words as follows, i.e. W0, W1, ., W67, W’0, W’1, . W’63, for compression function CF. a) divide the message group B(i) into 16 words, i.e. W0, W1, ., W15. 5.3.3 Compression function Let A, B, C, D, E, F, G and H be word registers, SS1, SS2, TT1 and TT2 intermediate variables, and compression function V(i+1) = CF (V(i), B(i)) (0 ≤ i ≤ n- 1). The calculation process is described as follows. 123 bits 64 bits Binary representation of l ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GM/T 0004-2012 be delivered?Answer: The full copy PDF of English version of GM/T 0004-2012 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GM/T 0004-2012_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0004-2012_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0004-2012 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GM/T 0004-2012?A step-by-step guide to download PDF of GM/T 0004-2012_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GM/T 0004-2012". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |