2025-12-19 10.8.118.215
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0003.2-2012
GM/T 0003.2-2012   Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm (English Version)
Standard No.: GM/T 0003.2-2012 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 8500 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2012-3-21 Delivery: via email in 1 business day

→ → →

,,2012-3-21,34E2370435DA3F9D1419314190287
Standard No.: GM/T 0003.2-2012
English Name: Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm
Chinese Name: SM2椭圆曲线公钥密码算法 第2部分:数字签名算法
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2012-03-21
Implemented on: 2012-3-21
Status: valid
Target Language: English
File Format: PDF
Word Count: 8500 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This part of GM/T 0003 specifies the digital signature algorithm of public key cryptographic algorithm SM2 based on elliptic curves, including generation and verification algorithm of digital signature, and gives examples of digital signature and verification and their corresponding processes. This part is applicable to digital signature and verification in commercial cryptographic application and can satisfy security requirements of identity authentication and data integrity & authenticity in multiple cryptographic applications. Meanwhile, this part also can provide standard setting and standardization reference with regard to products and technologies for security product manufacturers, and improve the credibility and interoperability of security products. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated reference, only the edition cited applies. For undated reference, the latest edition of the referenced document (including any amendments) applies. GM/T 0003.1-2012 Public Key Cryptographic Algorithm SM2 based on Elliptic Curves - Part 1: General 3 Terms and Definitions For the purposes of this document, the following terms and definitions apply. 3.1 message a bit string with any finite length 3.2 signed message a set of data items consisting of message and its signature part 3.3 signature key
Foreword i 1 Scope 2 Normative References 3 Terms and Definitions 4 Symbols 5 Digital Signature Algorithm 5.1 General 5.2 Elliptic Curve System Parameters 5.3 User Key Pair 5.4 Auxiliary Functions 5.4.1 General 5.4.2 Cryptographic Hash Function 5.4.3 Random Number Generator 5.5 Other Information on the User 6 Generation Algorithm and Process of Digital Signature 6.1 Generation Algorithm of Digital Signature 6.2 Generation Algorithm and Process of Digital Signature 7 Verification Algorithm and Process of Digital Signature 7.1 Verification Algorithm of Digital Signature 7.2 Verification Algorithm and Process of Digital Signature Annex A (Informative) Digital Signature and Verification Example A.1 General Requirements A.2 Digital Signature of Elliptic Curve over FQ A.3 Digital Signature of Elliptic Curve over
Code of China
Standard
GM/T 0003.2-2012  Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm (English Version)
Standard No.GM/T 0003.2-2012
Statusvalid
LanguageEnglish
File FormatPDF
Word Count8500 words
Price(USD)140.0
Implemented on2012-3-21
Deliveryvia email in 1 business day
Detail of GM/T 0003.2-2012
Standard No.
GM/T 0003.2-2012
English Name
Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm
Chinese Name
SM2椭圆曲线公钥密码算法 第2部分:数字签名算法
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2012-03-21
Implemented on
2012-3-21
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
8500 words
Price(USD)
140.0
Keywords
GM/T 0003.2-2012, GM 0003.2-2012, GMT 0003.2-2012, GM/T0003.2-2012, GM/T 0003.2, GM/T0003.2, GM0003.2-2012, GM 0003.2, GM0003.2, GMT0003.2-2012, GMT 0003.2, GMT0003.2
Introduction of GM/T 0003.2-2012
1 Scope This part of GM/T 0003 specifies the digital signature algorithm of public key cryptographic algorithm SM2 based on elliptic curves, including generation and verification algorithm of digital signature, and gives examples of digital signature and verification and their corresponding processes. This part is applicable to digital signature and verification in commercial cryptographic application and can satisfy security requirements of identity authentication and data integrity & authenticity in multiple cryptographic applications. Meanwhile, this part also can provide standard setting and standardization reference with regard to products and technologies for security product manufacturers, and improve the credibility and interoperability of security products. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated reference, only the edition cited applies. For undated reference, the latest edition of the referenced document (including any amendments) applies. GM/T 0003.1-2012 Public Key Cryptographic Algorithm SM2 based on Elliptic Curves - Part 1: General 3 Terms and Definitions For the purposes of this document, the following terms and definitions apply. 3.1 message a bit string with any finite length 3.2 signed message a set of data items consisting of message and its signature part 3.3 signature key
Contents of GM/T 0003.2-2012
Foreword i 1 Scope 2 Normative References 3 Terms and Definitions 4 Symbols 5 Digital Signature Algorithm 5.1 General 5.2 Elliptic Curve System Parameters 5.3 User Key Pair 5.4 Auxiliary Functions 5.4.1 General 5.4.2 Cryptographic Hash Function 5.4.3 Random Number Generator 5.5 Other Information on the User 6 Generation Algorithm and Process of Digital Signature 6.1 Generation Algorithm of Digital Signature 6.2 Generation Algorithm and Process of Digital Signature 7 Verification Algorithm and Process of Digital Signature 7.1 Verification Algorithm of Digital Signature 7.2 Verification Algorithm and Process of Digital Signature Annex A (Informative) Digital Signature and Verification Example A.1 General Requirements A.2 Digital Signature of Elliptic Curve over FQ A.3 Digital Signature of Elliptic Curve over
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0003.2-2012, GM 0003.2-2012, GMT 0003.2-2012, GM/T0003.2-2012, GM/T 0003.2, GM/T0003.2, GM0003.2-2012, GM 0003.2, GM0003.2, GMT0003.2-2012, GMT 0003.2, GMT0003.2