HomeSM2/SM3/SM4 Cryptography Encryption/Decryption

SM2/SM3/SM4 Cryptography Encryption/Decryption

Chinese commercial cryptography standard algorithms, supporting SM2 elliptic curve public key cryptography, SM3 cryptographic hash, and SM4 block cipher encryption/decryption and hash calculation

SM2 Elliptic Curve Public Key Cryptography

Key Generation

C1=Elliptic Curve Point, C2=Ciphertext Data, C3=SM3 Digest

Encrypt

Decrypt

SM Cryptography Documentation

SM2 Elliptic Curve Public Key Cryptography

SM2 is an elliptic curve public key cryptography algorithm specified in Chinese National Standard GBT 32918.2, providing secure public key encryption and digital signatures.

Common Applications

Digital certificates for financial institutions, authentication, secure communication

Related Standards

GB/T 32918 Series (SM2 Elliptic Curve Public Key Cryptography)

SM3 Cryptographic Hash Algorithm

SM3 is a cryptographic hash algorithm specified in Chinese National Standard GB/T 32905, outputting 256-bit digests for integrity verification and digital signatures.

Common Applications

Data integrity verification, digital signatures, cryptographic protocols

Related Standards

GB/T 32905 (SM3 Cryptographic Hash Algorithm)

SM4 Block Cipher

SM4 is a block cipher algorithm specified in Chinese National Standard GB/T 32907, using 128-bit blocks and 128-bit keys, supporting ECB, CBC, CTR and other modes.

Common Applications

Data encryption, key exchange, VPN and secure channels

Related Standards

GB/T 32907 (SM4 Block Cipher Algorithm)

Security Notes

  • Private keys must be kept secure and not transmitted over insecure networks
  • Hash algorithms are one-way and irreversible, used for data integrity verification
  • Keys and IVs should be randomly generated and stored securely

Frequently Asked Questions

Why use Chinese National Cryptography algorithms?
Chinese National Cryptography algorithms are Chinese commercial cryptography standards widely used in finance, government, defense and other fields. They have all passed evaluation and certification by the national cryptography management department, ensuring security.
What are the differences between SM2, SM3, and SM4?
SM2 is used for asymmetric encryption and digital signatures, SM3 is used for data hashing and integrity verification, and SM4 is used for symmetric encryption. The three are typically used together to implement a complete security solution.
What is the performance of Chinese National Cryptography algorithms?
The performance of Chinese National Cryptography algorithms is comparable to international standards (RSA/SHA/AES). SM4 performance is better than RSA, and SM3 performance is comparable to SHA-256.

Data is processed locally in your browser by default and will not be uploaded to any server. Upload will be clearly indicated if required.

© 2026 See-Tool. All rights reserved. | Contact Us