Overview of China’s Commercial Cryptographic Algorithm Standards
China’s commercial cryptographic algorithm system has been basically established, which is composed of ZUC stream cipher algorithm, SM4 block cipher algorithm, SM2 public key cryptographic algorithms based on elliptic curves, SM3 cryptographic hash algorithm and SM9 identity-based cryptographic algorithms. The above-mentioned algorithms have become the commercial cryptography industry standards and national standards of China. Some of them have become ISO/IEC international standards.
No. |
Cryptographic Algorithm |
Industry Standard Number |
National Standard Number |
ISO/IEC International Standard Number |
1 |
ZUC Stream Cipher Algorithm |
GM/T 0001-2012 |
GB/T 33133-2016 |
ISO/IEC 18033-4/AMD1:2020 |
2 |
SM4 Block Cipher Algorithm |
GM/T 0002-2012 |
GB/T 32907-2016 |
ISO/IEC 18033-3/AMD1:2021 |
3 |
SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves |
GM/T 0003-2012 |
GB/T 32918-2016 |
Digital Signature: ISO/IEC 14888-3:2018 |
4 |
SM3 Cryptographic Hash Algorithm |
GM/T 0004-2012 |
GB/T 32905-2016 |
ISO/IEC 10118-3:2018 |
5 |
SM9 Identity-based Cryptographic Algorithms |
GM/T 0044-2016 |
GB/T 38635-2020 |
Digital Signature: ISO/IEC 14888-3:2018 Identity-based Encryption: ISO/IEC 18033-5/AMD1:2021 Key Exchange: ISO/IEC 11770-3:2021 |
For the English version of cryptography industry standards, please refer to following websites:
1. ZUC Stream Cipher Algorithm
http://www.gmbz.org.cn/main/postDetail.html?id=20250123174530
2. SM4 Block Cipher Algorithm
http://www.gmbz.org.cn/main/postDetail.html?id=20250123174734
3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves
http://www.gmbz.org.cn/main/postDetail.html?id=20241118111410
4. SM3 Cryptographic Hash Algorithm
http://www.gmbz.org.cn/main/postDetail.html?id=20241118111047
5. SM9 Identity-based Cryptographic Algorithms
http://www.gmbz.org.cn/main/postDetail.html?id=20250123174859
For the Chinese version of cryptography industry standards, please refer to following websites:
1. ZUC Stream Cipher Algorithm
GM/T 0001.1:
http://www.gmbz.org.cn/main/viewfile/20180117202410524608.html
GM/T 0001.2:
http://www.gmbz.org.cn/main/viewfile/20180107233806310781.html
GM/T 0001.3:
http://www.gmbz.org.cn/main/viewfile/20180107234058336917.html
2. SM4 Block Cipher Algorithm
http://www.gmbz.org.cn/main/viewfile/20180108015408199368.html
3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves
GM/T 0003.1:
http://www.gmbz.org.cn/main/viewfile/20180108015515787986.html
GM/T 0003.2:
http://www.gmbz.org.cn/main/viewfile/20180108023346264349.html
GM/T 0003.3:
http://www.gmbz.org.cn/main/viewfile/20180108023456003485.html
GM/T 0003.4:
http://www.gmbz.org.cn/main/viewfile/20180108023602687857.html
GM/T 0003.5:
http://www.gmbz.org.cn/main/viewfile/2018010802371372251.html
4. SM3 Cryptographic Hash Algorithm
http://www.gmbz.org.cn/main/viewfile/20180108023812835219.html
5. SM9 Identity-based Cryptographic Algorithms
GM/T 0044.1:
http://www.gmbz.org.cn/main/viewfile/2018011002473633053.html
GM/T 0044.2:
http://www.gmbz.org.cn/main/viewfile/20180110024900801385.html
GM/T 0044.3:
http://www.gmbz.org.cn/main/viewfile/20180110025010004565.html
GM/T 0044.4:
http://www.gmbz.org.cn/main/viewfile/20180110025115084846.html
GM/T 0044.5:
http://www.gmbz.org.cn/main/viewfile/20180110025229918536.html