SM9 (cryptography Standard)
   HOME
*





SM9 (cryptography Standard)
SM9 is a Chinese national cryptography standard for Identity Based Cryptography issued by the Chinese State Cryptographic Authority in March 2016.  It is represented by the Chinese National Cryptography Standard ( Guomi), GM/T 0044-2016 SM9. The standard contains the following components: * (GM/T 0044.1) The Identity-Based Asymmetric Cryptography Algorithm * (GM/T 0044.2) The Identity-Based Digital Signature Algorithm which allows one entity to digitally sign a message which can be verified by another entity. * (GM/T 0044.3) The Identity-Based Key Establishment and Key Wrapping * (GM/T 0044.4) The Identity Based Public-Key Encryption Key Encapsulation Algorithm which allows one entity to securely send a symmetric key to another entity.  Identity Based Cryptography Identity Based Cryptography is a type of public key cryptography that uses a widely known representation of an entity's identity (name, email address, phone number etc.) as the entity's public key. This eliminates t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ID-based Cryptography
Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as a public key. The public string could include an email address, domain name, or a physical IP address. The first implementation of identity-based signatures and an email-address based public-key infrastructure (PKI) was developed by Adi Shamir in 1984, which allowed users to verify digital signatures using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity, with verification essentially the same as that required for issuing a certificate in a typical PKI. Shamir similarly proposed identity-based encryption, which appeared particularly attractive since there was no need to acquire an identity's public key prior to encryption. However, he was unable to come up with a concrete solution, and identity-based ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SM3 (hash Function)
SM3, Sm3, sM3, sm3 or SM-3 may refer to: *''Spider-Man 3'', the third ''Spider-Man'' film released in 2007 *''Superman III'', the third ''Superman'' film released in 1983 * Renault Samsung SM3, a car model made by Renault Samsung * VR Class Sm3, a type of train operated by the VR Group * SM3 postcode area, the Sutton postcode area covering North Cheam * RIM-161 Standard Missile 3, a naval launched anti-ballistic missile used by the US Navy * SM3 (hash function), a cryptographic hash function of Chinese national standard * Standard cubic meter A standard cubic foot (scf) is a unit used both in the natural gas industry to represent an amount of natural gas and in other industries where other gases are used. It is the unit commonly used when following the customary system, a collection ... (Sm3), an industrial unit measuring the amount of a gas * ''Shawn Mendes'' (album) or SM3, the third album by the Canadian singer Shawn Mendes {{Letter-Number Combination Disambiguation ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




SM4 (cipher)
ShāngMì 4 (SM4, 商密4) (formerly SMS4) is a block cipher used in the Chinese National Standard for Wireless LAN WAPI (WLAN Authentication and Privacy Infrastructure) and also used with Transport Layer Security. SM4 was a cipher proposed to for the IEEE 802.11i standard, but has so far been rejected by ISO. One of the reasons for the rejection has been opposition to the WAPI fast-track proposal by the IEEE. The SM4 algorithm was drafted by Data Assurance & Communication Security Center, CAS, and Commercial Cryptography Testing Center, National Cryptography Administration. It is mainly developed by Lü Shuwang ( zh, 吕述望). The algorithm was declassified in January, 2006, and it became a national standard (GB/T 32907-2016) in August 2016.Lu Shuwang. Journal of Information Security Research, 2016, 2(11): 995-1007. Cipher detail The SM4 cipher has a key size and a block size of 128 bits each. Encryption or decryption of one block of data is composed of 32 rounds. A non-l ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ZUC Stream Cipher
ZUC is a stream cipher included in the Long Term Evolution standards used in 3GPP specifications for confidentiality and integrity . It is named after Zu Chongzhi, the fifth-century Chinese mathematician. It uses a 16-stage linear feedback shift register In computing, a linear-feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. The most commonly used linear function of single bits is exclusive-or (XOR). Thus, an LFSR is most often a sh ... with each stage in (2^-1) and produces a 32-bit word on each tick. References Further reading * Zu Chongzhi Stream ciphers {{crypto-stub ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptography Standards
There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis. Encryption standards * Data Encryption Standard (DES, now obsolete) * Advanced Encryption Standard (AES) * RSA the original public key algorithm * OpenPGP Hash standards * MD5 128-bit (obsolete) * SHA-1 160-bit (obsolete) * SHA-2 available in 224, 256, 384, and 512-bit variants * HMAC keyed hash * PBKDF2 Key derivation function (RFC 2898) Digital signature standards * Digital Signature Standard (DSS), based on the Digital Signature Algorithm (DSA) * RSA * Elliptic Curve DSA Public-key infrastructure (PKI) standards * X.509 Public Key Certificates Wireless Standards * Wired Equivalent Privacy (WEP), severely flawed and superseded by WPA * Wi-Fi Protected Access (WPA) better than WEP, a 'pre-standard' partial version of 802.11i * 802.11i a.k.a. WPA2, uses AES and other improvements ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]