1 Scope
This standard defines application method of SM2 algorithm and data format for key, encryption, signature, etc.
This standard is applicable to application of SM2 algorithm and R&D and testing of SM2 algorithm-based equipment and system.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0003 (all parts) Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves
GM/T 0004 SM3 Cryptographic Hash Algorithm
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
algorithm identifier
digitized information used to indicate algorithm mechanism.
3.2
SM2 algorithm
one elliptic curve cryptography algorithm, having key length of 256 bits.
3.3
SM3 algorithm
one hash algorithm, having output length of 256 bits.
4 Symbols and Abbreviations
For the purposes of this document, the following abbreviations apply.
Foreword i
Introduction ii
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviations
5 SM2 Key Pair
5.1 SM2 Private Key
5.2 SM2 Public Key
6 Data Conversion
6.1 Conversion from Bit String to Octet String
6.2 Conversion from Octet String to Bit String
6.3 Conversion from Integer to Octet String
6.4 Conversion from Octet String to Integer
7 Data Format
7.1 Key Data Format
7.2 Encrypted Data Format
7.3 Signature Data Format
7.4 Protected Data Format of Key Pair
8 Preliminaries
8.1 Preliminary
8.2 Preliminary
9 Computation Process
9.1 Generate Key
9.2 Encryption
9.3 Decryption
9.4 Digital Signature
9.5 Signature Verification
9.6 Key Negotiation
10 Identity ID Default
1 Scope
This standard defines application method of SM2 algorithm and data format for key, encryption, signature, etc.
This standard is applicable to application of SM2 algorithm and R&D and testing of SM2 algorithm-based equipment and system.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0003 (all parts) Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves
GM/T 0004 SM3 Cryptographic Hash Algorithm
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
algorithm identifier
digitized information used to indicate algorithm mechanism.
3.2
SM2 algorithm
one elliptic curve cryptography algorithm, having key length of 256 bits.
3.3
SM3 algorithm
one hash algorithm, having output length of 256 bits.
4 Symbols and Abbreviations
For the purposes of this document, the following abbreviations apply.
Contents of GM/T 0009-2012
Foreword i
Introduction ii
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviations
5 SM2 Key Pair
5.1 SM2 Private Key
5.2 SM2 Public Key
6 Data Conversion
6.1 Conversion from Bit String to Octet String
6.2 Conversion from Octet String to Bit String
6.3 Conversion from Integer to Octet String
6.4 Conversion from Octet String to Integer
7 Data Format
7.1 Key Data Format
7.2 Encrypted Data Format
7.3 Signature Data Format
7.4 Protected Data Format of Key Pair
8 Preliminaries
8.1 Preliminary
8.2 Preliminary
9 Computation Process
9.1 Generate Key
9.2 Encryption
9.3 Decryption
9.4 Digital Signature
9.5 Signature Verification
9.6 Key Negotiation
10 Identity ID Default