Pure-Rust, #![no_std] implementation of Chinese commercial cryptography standards (国密/GuoMi) with constant-time operations throughout. Designed for embedded systems, WASM, and production use.
Security Notice: This library has not been independently audited. While all secret-dependent operations are constant-time and
#![forbid(unsafe_code)]is enforced, you should evaluate the risks before using it in production. Report vulnerabilities via SECURITY.md or email kintai@foxmail.com.
| Algorithm | Standard | Description |
|---|---|---|
| SM2 | GB/T 32918.1-5-2016 | Elliptic Curve Public Key Cryptography |
| SM3 | GB/T 32905-2016 | Cryptographic Hash Algorithm (256-bit) |
| SM4 | GB/T 32907-2016 | Block Cipher (128-bit key, ECB/CBC/CTR/GCM/CCM/XTS) |
| SM9 | GB/T 38635.1-2-2020 | Identity-Based Cryptography (BN256 pairing) |
| BLS | IETF RFC 9380 | BLS Signatures & Threshold Signatures (BN256) |
| FPE | NIST SP 800-38G | Format-Preserving Encryption (FF1-like) |
#![no_std]— works in embedded, WASM, and bare-metal environments#![forbid(unsafe_code)]— zerounsafeblocks- Constant-time — all secret-dependent operations use
subtleprimitives - Auto-zeroize — private keys cleared on drop via
zeroize - Side-channel resistant SM4 S-box — boolean circuit bitslice (no table lookup)
- Complete EC formulas — SM2 point addition uses branch-free complete formulas
Add to Cargo.toml:
[dependencies]
libsmx = "0.3"use libsmx::sm3::Sm3Hasher;
// One-shot hash
let digest = Sm3Hasher::digest(b"abc");
assert_eq!(digest.len(), 32);
// Streaming hash
let mut h = Sm3Hasher::new();
h.update(b"ab");
h.update(b"c");
assert_eq!(h.finalize(), digest);use libsmx::sm3::hmac_sm3;
let mac = hmac_sm3(b"secret-key", b"message");
assert_eq!(mac.len(), 32);use libsmx::sm2::{generate_keypair, get_z, get_e, sign, verify};
let mut rng = rand::rngs::OsRng;
// Key generation
let (pri_key, pub_key) = generate_keypair(&mut rng);
// Sign: compute Z value and message digest per GB/T 32918.2
let z = get_z(b"1234567812345678", &pub_key);
let e = get_e(&z, b"hello SM2");
let sig = sign(&e, &pri_key, &mut rng);
// Verify
verify(&e, &pub_key, &sig).expect("signature valid");use libsmx::sm4::{sm4_encrypt_gcm, sm4_decrypt_gcm};
let key = [0u8; 16];
let nonce = [0u8; 12];
let aad = b"additional data";
let plaintext = b"secret message";
let (ciphertext, tag) = sm4_encrypt_gcm(&key, &nonce, aad, plaintext);
let decrypted = sm4_decrypt_gcm(&key, &nonce, aad, &ciphertext, &tag).unwrap();
assert_eq!(decrypted, plaintext);use libsmx::sm4::{sm4_encrypt_cbc, sm4_decrypt_cbc};
let key = [0u8; 16];
let iv = [0u8; 16];
let plaintext = [0u8; 32]; // must be 16-byte aligned
let ciphertext = sm4_encrypt_cbc(&key, &iv, &plaintext);
let decrypted = sm4_decrypt_cbc(&key, &iv, &ciphertext);
assert_eq!(decrypted, plaintext);use libsmx::sm9::{generate_sign_master_keypair, generate_sign_user_key};
use libsmx::sm9::{sm9_sign, sm9_verify};
let mut rng = rand::rngs::OsRng;
// KGC generates master keypair
let (master_priv, sign_pub) = generate_sign_master_keypair(&mut rng);
// KGC generates user signing key for identity
let user_id = b"alice@example.com";
let user_key = generate_sign_user_key(&master_priv, user_id).unwrap();
// User signs message
let msg = b"hello SM9";
let (h, s) = sm9_sign(msg, &user_key, &sign_pub, &mut rng).unwrap();
// Anyone can verify with user's identity + master public key
sm9_verify(msg, &h, &s, user_id, &sign_pub).unwrap();| Mode | Encrypt | Decrypt |
|---|---|---|
| ECB | sm4_encrypt_ecb |
sm4_decrypt_ecb |
| CBC | sm4_encrypt_cbc |
sm4_decrypt_cbc |
| OFB | sm4_crypt_ofb |
sm4_crypt_ofb |
| CFB | sm4_encrypt_cfb |
sm4_decrypt_cfb |
| CTR | sm4_crypt_ctr |
sm4_crypt_ctr |
| GCM | sm4_encrypt_gcm |
sm4_decrypt_gcm |
| CCM | sm4_encrypt_ccm |
sm4_decrypt_ccm |
| XTS | sm4_encrypt_xts |
sm4_decrypt_xts |
| Feature | Default | Description |
|---|---|---|
alloc |
Yes | Enables Vec-returning APIs (SM2/SM9 encrypt/decrypt, SM4 modes) |
std |
No | Enables std::error::Error impl and re-exports rand_core/std |
rustls-provider |
No | Enables rustls CryptoProvider with RFC 8998 ShangMi TLS 1.3 cipher suites |
For no_std without alloc:
[dependencies]
libsmx = { version = "0.3", default-features = false }With rustls TLS 1.3 provider:
[dependencies]
libsmx = { version = "0.3", features = ["rustls-provider"] }Measured on Linux x86_64 (single core). All operations are constant-time.
| Algorithm | Data Size | Time | Throughput |
|---|---|---|---|
| SM3 hash | 64 B | 349 ns | — |
| SM3 hash | 1 KiB | 2.80 µs | — |
| SM3 hash | 64 KiB | 167 µs | 374 MiB/s |
| SM4-ECB encrypt | 16 B | 1.14 µs | — |
| SM4-ECB encrypt | 1 KiB | 37.0 µs | — |
| SM4-ECB encrypt | 64 KiB | 2.32 ms | 27 MiB/s |
| Operation | Time |
|---|---|
| Key generation | 221 µs |
| Sign | 258 µs |
| Verify | 316 µs |
| Encrypt | 639 µs |
| Decrypt | 417 µs |
| Operation | Time |
|---|---|
| Master keygen | 753 µs |
| User keygen | 324 µs |
| Sign | 3.44 ms |
| Verify | 5.50 ms |
| Encrypt | 4.68 ms |
| Decrypt | 1.54 ms |
Run benchmarks locally:
cargo bench- All secret-dependent operations are constant-time (fixed iteration counts, mask-based selection)
- SM4 S-box uses boolean circuit bitslice — zero memory access patterns, immune to cache-timing attacks
- SM2 scalar multiplication uses complete addition formulas with no data-dependent branches
- Private keys implement
ZeroizeOnDropfor automatic cleanup - GCM/CCM authentication tags are verified in constant time
Disclaimer: This library has not been independently audited. See SECURITY.md for vulnerability reporting.
Bug reports, feature requests, and pull requests are welcome on GitHub.
For security vulnerabilities, please do not open public issues. Instead, email kintai@foxmail.com directly. See SECURITY.md for details.
The minimum supported Rust version is 1.83.0. MSRV bumps are treated as minor version changes.
Licensed under the Apache License, Version 2.0. See LICENSE for details.