1 Scope
This part of GB/T 32918 specifies the public key encryption algorithm for the public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of message encryption and decryption and their corresponding processes.
This part is applicable to the message encryption and decryption in the commercial cypher application, the message sender can encrypt the message with the receiver’s public key and the receiver decrypts with corresponding private key to obtain the message.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated reference, only the edition cited applies. For undated reference, the latest edition of the referenced document (including any amendments) applies.
GB/T 32918.1-2016 Information Security Technology — Public Key Cryptographic Algorithm SM2 based on Elliptic Curves — Part 1: General
GB/T 32905-2016 Information Security Techniques — SM3 Cryptographic Hash Algorithm
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
secret key
a kind of key that is shared by the sender and the receiver and is not known to the third party in the cryptosystem
3.2
message
a bit string with any finite length
3.3
key derivation function
a function that generates one or more shared secret keys by acting on the shared secret and other parameters known to both parties
4 Symbols
For the purpose of this part, the following symbols apply.
Foreword II
Introduction III
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols
5 Algorithm Parameters and Auxiliary Functions
5.1 General
5.2 Elliptic Curve System Parameters
5.3 User Key Pair
5.4 Auxiliary Functions
6 EncryptionAlgorithm andits Process
6.1 EncryptionAlgorithm
6.2 EncryptionAlgorithm Process
7 Decryption Algorithm and its Process
7.1 Decryption Algorithm
7.2 Decryption Algorithm Process
Annex A (Informative) Examples of Message Encryption and Decryption
A.1 General Requirements
A.2 Elliptic Curve Message Encryption and Decryption on Fp
A.3 Elliptic Curve Message Encryption and Decryption on
Bibliography
1 Scope
This part of GB/T 32918 specifies the public key encryption algorithm for the public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of message encryption and decryption and their corresponding processes.
This part is applicable to the message encryption and decryption in the commercial cypher application, the message sender can encrypt the message with the receiver’s public key and the receiver decrypts with corresponding private key to obtain the message.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated reference, only the edition cited applies. For undated reference, the latest edition of the referenced document (including any amendments) applies.
GB/T 32918.1-2016 Information Security Technology — Public Key Cryptographic Algorithm SM2 based on Elliptic Curves — Part 1: General
GB/T 32905-2016 Information Security Techniques — SM3 Cryptographic Hash Algorithm
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
secret key
a kind of key that is shared by the sender and the receiver and is not known to the third party in the cryptosystem
3.2
message
a bit string with any finite length
3.3
key derivation function
a function that generates one or more shared secret keys by acting on the shared secret and other parameters known to both parties
4 Symbols
For the purpose of this part, the following symbols apply.
Contents of GB/T 32918.4-2016
Foreword II
Introduction III
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols
5 Algorithm Parameters and Auxiliary Functions
5.1 General
5.2 Elliptic Curve System Parameters
5.3 User Key Pair
5.4 Auxiliary Functions
6 EncryptionAlgorithm andits Process
6.1 EncryptionAlgorithm
6.2 EncryptionAlgorithm Process
7 Decryption Algorithm and its Process
7.1 Decryption Algorithm
7.2 Decryption Algorithm Process
Annex A (Informative) Examples of Message Encryption and Decryption
A.1 General Requirements
A.2 Elliptic Curve Message Encryption and Decryption on Fp
A.3 Elliptic Curve Message Encryption and Decryption on
Bibliography