This part of GM/T 0003 specifies the key exchange protocol for the public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of key exchange and verification and their corresponding processes.
This part is applicable to the key exchange in the commercial cypher application, which can satisfy the two-way or optional three-way information transmission process of the communication parties, and by which a shared secret key (session key) jointly determined by both parties can be computed and obtained. Meanwhile, this part also can provide standard setting and standardization reference with regard to products and technologies for security product manufacturers, and improve the credibility and interoperability of security products.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0003.1-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 1: General
3 Terms and Definitions
For the purpose of this standard, the following terms and definitions apply.
3.1
key confirmation from A to B
a guarantee from User A that makes User B confirm that User A has a particular secret key
3.2
key derivation function
a function of one or more shared secret keys is generated by acting on the shared secret and other parameters known to both parties
Foreword i 1 Scope 2 Normative References 3 Terms and Definitions 4 Symbols 5 Algorithm Parameters and Auxiliary Functions 5.1 General 5.2 Elliptic Curve System Parameters 5.3 User Key Pair 5.4 Auxiliary Functions 5.4.1 General 5.4.2 Cryptographic Hash Function 5.4.3 Key Derivation Function 5.4.4 Random number generator 5.5 Other Information on the User 6 Key Exchange Protocol and Its Process 6.1 Key Exchange Protocol 6.2 Key Exchange Protocol Process Annex A (Informative) Examples of Key Exchange and Verification A.1 General Requirements A.2 Key Exchange Protocol of Elliptic Curve over Fp A.3 Key Exchange Protocol of Elliptic Curve over
1 Scope
This part of GM/T 0003 specifies the key exchange protocol for the public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of key exchange and verification and their corresponding processes.
This part is applicable to the key exchange in the commercial cypher application, which can satisfy the two-way or optional three-way information transmission process of the communication parties, and by which a shared secret key (session key) jointly determined by both parties can be computed and obtained. Meanwhile, this part also can provide standard setting and standardization reference with regard to products and technologies for security product manufacturers, and improve the credibility and interoperability of security products.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0003.1-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 1: General
3 Terms and Definitions
For the purpose of this standard, the following terms and definitions apply.
3.1
key confirmation from A to B
a guarantee from User A that makes User B confirm that User A has a particular secret key
3.2
key derivation function
a function of one or more shared secret keys is generated by acting on the shared secret and other parameters known to both parties
Contents of GM/T 0003.3-2012
Foreword i
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols
5 Algorithm Parameters and Auxiliary Functions
5.1 General
5.2 Elliptic Curve System Parameters
5.3 User Key Pair
5.4 Auxiliary Functions
5.4.1 General
5.4.2 Cryptographic Hash Function
5.4.3 Key Derivation Function
5.4.4 Random number generator
5.5 Other Information on the User
6 Key Exchange Protocol and Its Process
6.1 Key Exchange Protocol
6.2 Key Exchange Protocol Process
Annex A (Informative) Examples of Key Exchange and Verification
A.1 General Requirements
A.2 Key Exchange Protocol of Elliptic Curve over Fp
A.3 Key Exchange Protocol of Elliptic Curve over