GB/T 41389-2022 Information security technology - SM9 cryptographic algorithm application specification
1 Scope
This document specifies the usage requirements of SM9 cryptographic algorithm, and describes the data formats of key, encryption and signature.
It is applicable to correct and normative use of SM9 cryptographic algorithm, as well as the guidance for developing and detecting devices and systems that use the SM9 cryptographic algorithm.
2 Normative references
The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 16262.1-2006 Information technology - Abstract Syntax Notation One (ASN.1) - Part 1: Specification of basic notation
GB/T 17964 Information security technology - Modes of operation for a block cipher
GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm
GB/T 32907 Information security technology - SM4 block cipher algorithm
GB/T 32915 Information security technology - Randomness test methods for binary sequence
GB/T 35276-2017 Information security technology - SM2 cryptographic algorithm usage specification
GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General
GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
SM9 algorithm
public key cryptographic algorithm based on elliptic curve of identity
3.2
signature master key
root signature key pair for the key management infrastructure
Note: Including signature master private key and signature master public key, used for digital signature, signature verification and user signature key generation.
3.3
encryption master key
root encryption key pair for the key management infrastructure
Note: Including encryption master private key and encryption master public key, used for data encryption, decryption and user encryption key generation.
3.4
user signature key
signature key pair for user
Foreword i
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Key pair of SM9
5.1 Generating element
5.2 SM9 master private key
5.3 SM9 master public key
5.4 SM9 user private key
5.5 SM9 user public key
6 Technical requirements
6.1 Data format
6.2 Preprocessing
6.3 Calculation process
7 Verification method
7.1 Data format
7.2 Preprocessing
7.3 Calculation process
Annex A (Normative) Examples for test of data format encoding
GB/T 41389-2022 Information security technology - SM9 cryptographic algorithm application specification
1 Scope
This document specifies the usage requirements of SM9 cryptographic algorithm, and describes the data formats of key, encryption and signature.
It is applicable to correct and normative use of SM9 cryptographic algorithm, as well as the guidance for developing and detecting devices and systems that use the SM9 cryptographic algorithm.
2 Normative references
The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 16262.1-2006 Information technology - Abstract Syntax Notation One (ASN.1) - Part 1: Specification of basic notation
GB/T 17964 Information security technology - Modes of operation for a block cipher
GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm
GB/T 32907 Information security technology - SM4 block cipher algorithm
GB/T 32915 Information security technology - Randomness test methods for binary sequence
GB/T 35276-2017 Information security technology - SM2 cryptographic algorithm usage specification
GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General
GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
SM9 algorithm
public key cryptographic algorithm based on elliptic curve of identity
3.2
signature master key
root signature key pair for the key management infrastructure
Note: Including signature master private key and signature master public key, used for digital signature, signature verification and user signature key generation.
3.3
encryption master key
root encryption key pair for the key management infrastructure
Note: Including encryption master private key and encryption master public key, used for data encryption, decryption and user encryption key generation.
3.4
user signature key
signature key pair for user
Contents of GB/T 41389-2022
Foreword i
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Key pair of SM9
5.1 Generating element
5.2 SM9 master private key
5.3 SM9 master public key
5.4 SM9 user private key
5.5 SM9 user public key
6 Technical requirements
6.1 Data format
6.2 Preprocessing
6.3 Calculation process
7 Verification method
7.1 Data format
7.2 Preprocessing
7.3 Calculation process
Annex A (Normative) Examples for test of data format encoding