Generate Chinese standard SM3 hashes for regulatory compliance and financial security.
About
SM3 is the Chinese national cryptographic hash standard that produces a 256-bit hash using a Merkle-Damgård construction with 16 32-bit registers, providing security comparable to SHA-256.
Specifications
Output Size256 bits
StandardGM/T 0004-2012
Standard Year2012
Origin Year 2010
Use Cases
—Chinese regulatory compliance
—Financial systems in China
—Government and enterprise applications
Frequently Asked Questions
SM3 and SHA-256 have similar performance characteristics on most platforms. SM3 uses 16 32-bit registers versus SHA-256's 8 registers, which can provide slightly better parallelization on some hardware. In software implementations, they typically achieve comparable throughput. SHA-256 benefits from hardware acceleration (Intel SHA-NI, ARM Cryptography Extensions) on modern processors, which SM3 lacks outside of specialized Chinese hardware.
SM3 support is growing but limited compared to SHA-256. OpenSSL 1.1.1+ includes SM3 support. Most Western cryptographic libraries do not include SM3 by default. For international applications requiring cross-border compatibility, SHA-256 or SHA-3 are recommended. Use SM3 when specifically required for Chinese compliance or when integrating with Chinese systems.
SM3 is a Chinese national cryptographic hash standard (GM/T 0004-2012) producing 256-bit hashes. It is widely used in Chinese government systems, financial institutions, and commercial applications within China for digital signatures, data integrity, and certificate generation.
SM3 and SHA-256 both produce 256-bit outputs with similar security levels (128-bit collision resistance). SM3 uses 16 registers in its compression function versus SHA-256's 8 registers. While SHA-256 is more widely adopted globally, SM3 is the required standard for cryptographic applications in China.
For international applications, SHA-256 or SHA-3 are generally preferred due to broader support and standardization. Use SM3 primarily when: (1) targeting the Chinese market, (2) complying with Chinese regulations, (3) integrating with Chinese government or financial systems, or (4) requiring algorithm diversity for specific security architectures.