nakov / Practical-Cryptography-for-Developers-Book

Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
https://cryptobook.nakov.com
MIT License
3.46k stars 418 forks source link

Need some clarifications from author about "Secure Hash Algorithms" #43

Open NimitzDEV opened 3 years ago

NimitzDEV commented 3 years ago

Hello, there are some confusions in chapter Secure Hash Algorithms

See SM3 algorithm under section "Other Secure Hash Functions", there are bold style applied around "Chinese goverment". What does the bold style mean? And also, SM3 algorithm is a Chinese National Standard, I would suggest to describe it as a Chinese National Standard like the description about GOST algorithm.