1 Scope
This standard defines SM2 cryptography message syntax.
This standard is applicable to standardized encapsulation of operation results during SM2 algorithm encryption and signing.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0006 Cryptographic Application Identity Specification
GM/T 0009 SM2 Cryptography Algorithm Application Specification
PKCS #6 Extended-Certificate Syntax
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
algorithm identifier
digitized information used to indicate algorithm mechanism.
3.2
SM2 algorithm
one Elliptic Curve Cryptography, having key length of 256 bits.
4 Symbols and Abbreviation
For the purpose of this standard, the following abbreviations apply.
ECC Elliptic Curve Cryptography
ID Identity
OID Object Identity
Foreword i
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviation
5 Definitions of OID
6 Definitions of Basic Types
6.1 CertificateRevocationLists
6.2 ContentEncryptionAlgorithmIdentifier
6.3 DigestAlgorithmIdentifier
6.4 DigestEncryptionAlgorithmIdentifier
6.5 ExtendedCertificateOrCertificate
6.6 ExtendedCertificatesAndCertificates
6.7 IssuerAndSerialNumber
6.8 KeyEncryptionAlgorithmIdentifier
6.9 Version
6.10 ContentInfo
7 Data Type—Data
8 Signed Date Type—signedData
8.1 signedData Type
8.2 SignerInfo Type
9 Digital Enveloped Data Type—envelopedData
9.1 envelopedData Type
9.2 RecipientInfo Type
10 Signed and Digital Enveloped Data Type—signedAndEnvelopedData
11 Encrypted Data Type—EncryptedData
12 Key agreement Type—keyAgreementInfo
Annex A (Normative) SM2 Key Format
A.1 Elliptic Curve Parameters Syntax
A.2 Public Key Syntax
A.3 Private Key Syntax
References
1 Scope
This standard defines SM2 cryptography message syntax.
This standard is applicable to standardized encapsulation of operation results during SM2 algorithm encryption and signing.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GM/T 0006 Cryptographic Application Identity Specification
GM/T 0009 SM2 Cryptography Algorithm Application Specification
PKCS #6 Extended-Certificate Syntax
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
algorithm identifier
digitized information used to indicate algorithm mechanism.
3.2
SM2 algorithm
one Elliptic Curve Cryptography, having key length of 256 bits.
4 Symbols and Abbreviation
For the purpose of this standard, the following abbreviations apply.
ECC Elliptic Curve Cryptography
ID Identity
OID Object Identity
Contents of GM/T 0010-2012
Foreword i
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols and Abbreviation
5 Definitions of OID
6 Definitions of Basic Types
6.1 CertificateRevocationLists
6.2 ContentEncryptionAlgorithmIdentifier
6.3 DigestAlgorithmIdentifier
6.4 DigestEncryptionAlgorithmIdentifier
6.5 ExtendedCertificateOrCertificate
6.6 ExtendedCertificatesAndCertificates
6.7 IssuerAndSerialNumber
6.8 KeyEncryptionAlgorithmIdentifier
6.9 Version
6.10 ContentInfo
7 Data Type—Data
8 Signed Date Type—signedData
8.1 signedData Type
8.2 SignerInfo Type
9 Digital Enveloped Data Type—envelopedData
9.1 envelopedData Type
9.2 RecipientInfo Type
10 Signed and Digital Enveloped Data Type—signedAndEnvelopedData
11 Encrypted Data Type—EncryptedData
12 Key agreement Type—keyAgreementInfo
Annex A (Normative) SM2 Key Format
A.1 Elliptic Curve Parameters Syntax
A.2 Public Key Syntax
A.3 Private Key Syntax
References