中文

Overview of China’s Commercial Cryptographic Algorithm Standards

2025-03-17
Font size:  Big   Middle   Small

China’s commercial cryptographic algorithm system has been basically established, which is composed of ZUC stream cipher algorithm, SM4 block cipher algorithm, SM2 public key cryptographic algorithms based on elliptic curves, SM3 cryptographic hash algorithm and SM9 identity-based cryptographic algorithms. The above-mentioned algorithms have become the commercial cryptography industry standards and national standards of China. Some of them have become ISO/IEC international standards.

No.Cryptographic
Algorithm
Industry
Algorithm
National
Standard Number
ISO/IEC International
Standard Number
1ZUC Stream
Cipher Algorithm
GM/T 0001-2012GB/T 33133-2016ISO/IEC 18033-4/AMD1:2020
2SM4 Block
Cipher Algorithm
GM/T 0002-2012GB/T 32907-2016ISO/IEC 18033-3/AMD1:2021
3SM2 Public Key 
Cryptographic Algorithms 
Based on Elliptic Curves
GM/T 0003-2012GB/T 32918-2016Digital Signature:
ISO/IEC 14888-3:2018
4SM3 Cryptographic 
Hash Algorithm
GM/T 0004-2012GB/T 32905-2016ISO/IEC 10118-3:2018
5SM9 Identity-based Cryptographic 
Algorithms
GM/T 0044-2016GB/T 38635-2020Digital Signature:
ISO/IEC 14888-3:2018
Identity-based Encryption:
ISO/IEC 18033-5/AMD1:2021
Key Exchange:
ISO/IEC 11770-3:2021

For the English version of cryptography industry standards, please refer to following websites:

1. ZUC Stream Cipher Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174530

2. SM4 Block Cipher Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174734

3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves

http://www.gmbz.org.cn/main/postDetail.html?id=20241118111410

4. SM3 Cryptographic Hash Algorithm

http://www.gmbz.org.cn/main/postDetail.html?id=20241118111047

5. SM9 Identity-based Cryptographic Algorithms

http://www.gmbz.org.cn/main/postDetail.html?id=20250123174859

For the Chinese version of cryptography industry standards, please refer to following websites:

1. ZUC Stream Cipher Algorithm

GM/T 0001.1:

http://www.gmbz.org.cn/main/viewfile/20180117202410524608.html

GM/T 0001.2:

http://www.gmbz.org.cn/main/viewfile/20180107233806310781.html

GM/T 0001.3:

http://www.gmbz.org.cn/main/viewfile/20180107234058336917.html

2. SM4 Block Cipher Algorithm

http://www.gmbz.org.cn/main/viewfile/20180108015408199368.html

3. SM2 Public Key Cryptographic Algorithms Based on Elliptic Curves

GM/T 0003.1:

http://www.gmbz.org.cn/main/viewfile/20180108015515787986.html

GM/T 0003.2:

http://www.gmbz.org.cn/main/viewfile/20180108023346264349.html

GM/T 0003.3:

http://www.gmbz.org.cn/main/viewfile/20180108023456003485.html

GM/T 0003.4:

http://www.gmbz.org.cn/main/viewfile/20180108023602687857.html

GM/T 0003.5:

http://www.gmbz.org.cn/main/viewfile/2018010802371372251.html

4. SM3 Cryptographic Hash Algorithm

http://www.gmbz.org.cn/main/viewfile/20180108023812835219.html

5. SM9 Identity-based Cryptographic Algorithms

GM/T 0044.1:

http://www.gmbz.org.cn/main/viewfile/2018011002473633053.html

GM/T 0044.2:

http://www.gmbz.org.cn/main/viewfile/20180110024900801385.html

GM/T 0044.3:

http://www.gmbz.org.cn/main/viewfile/20180110025010004565.html

GM/T 0044.4:

http://www.gmbz.org.cn/main/viewfile/20180110025115084846.html

GM/T 0044.5:

http://www.gmbz.org.cn/main/viewfile/20180110025229918536.html


相关附件