中文
Notice

Overview of Chinas Commercial Cryptographic Algorithm Standards

    China’s commercial cryptographic algorithm system has been basically established, which is composed of ZUC stream cipher algorithm, SM4 block cipher algorithm, SM2 public key cryptographic algorithms based on elliptic curves, SM3 cryptographic hash algorithm and SM9 identity-based cryptographic algorithms. The above-mentioned algorithms have become the commercial cryptography industry standards and  national standards of China. Some of them have become ISO/IEC international standards.

No.

Cryptographic

Algorithm

Industry

Standard Number

National

Standard Number

ISO/IEC International

Standard Number

1

ZUC Stream

Cipher Algorithm

GM/T 0001-2012

GB/T 33133-2016

ISO/IEC 18033-4/AMD1:2020

2

SM4 Block

Cipher Algorithm

GM/T 0002-2012

GB/T 32907-2016

ISO/IEC 18033-3/AMD1:2021

3

SM2 Public Key 

Cryptographic Algorithms 

Based on Elliptic Curves

GM/T 0003-2012

GB/T 32918-2016

Digital Signature:

ISO/IEC 14888-3:2018

4

SM3 Cryptographic 

Hash Algorithm

GM/T 0004-2012

GB/T 32905-2016

ISO/IEC 10118-3:2018

5

SM9 Identity-based Cryptographic 

Algorithms

GM/T 0044-2016

GB/T 38635-2020

Digital Signature:

ISO/IEC 14888-3:2018

Identity-based Encryption:

ISO/IEC 18033-5/AMD1:2021

Key Exchange:

ISO/IEC 11770-3:2021

    For the English version of cryptography industry standards, please refer to following websites:

    1. ZUC Stream Cipher Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174530

2. SM4 Block Cipher Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174734

3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves

http://www.gmbz.org.cn/main/postDetail.html?id=20241118111410

4. SM3 Cryptographic Hash Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20241118111047

5. SM9 Identity-based Cryptographic Algorithms

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174859

For the Chinese version of cryptography industry standards, please refer to following websites:

1. ZUC Stream Cipher Algorithm

GM/T 0001.1:

http://www.gmbz.org.cn/main/viewfile/20180117202410524608.html

GM/T 0001.2:

http://www.gmbz.org.cn/main/viewfile/20180107233806310781.html

GM/T 0001.3:

http://www.gmbz.org.cn/main/viewfile/20180107234058336917.html

2. SM4 Block Cipher Algorithm

http://www.gmbz.org.cn/main/viewfile/20180108015408199368.html

3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves

GM/T 0003.1:

http://www.gmbz.org.cn/main/viewfile/20180108015515787986.html

GM/T 0003.2:

http://www.gmbz.org.cn/main/viewfile/20180108023346264349.html

GM/T 0003.3:

http://www.gmbz.org.cn/main/viewfile/20180108023456003485.html

GM/T 0003.4:

http://www.gmbz.org.cn/main/viewfile/20180108023602687857.html

GM/T 0003.5:

http://www.gmbz.org.cn/main/viewfile/2018010802371372251.html

4. SM3 Cryptographic Hash Algorithm

http://www.gmbz.org.cn/main/viewfile/20180108023812835219.html

5. SM9 Identity-based Cryptographic Algorithms

GM/T 0044.1:

http://www.gmbz.org.cn/main/viewfile/2018011002473633053.html

GM/T 0044.2:

http://www.gmbz.org.cn/main/viewfile/20180110024900801385.html

GM/T 0044.3:

http://www.gmbz.org.cn/main/viewfile/20180110025010004565.html

GM/T 0044.4:

http://www.gmbz.org.cn/main/viewfile/20180110025115084846.html

GM/T 0044.5:

http://www.gmbz.org.cn/main/viewfile/20180110025229918536.html