GB/T 35276-2017 English PDFUS$199.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 35276-2017: Information security technology -- SM2 cryptography algorithm usage specification Status: Valid
Basic dataStandard ID: GB/T 35276-2017 (GB/T35276-2017)Description (Translated English): Information security technology -- SM2 cryptography algorithm usage specification Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 10,135 Date of Issue: 2017-12-29 Date of Implementation: 2018-07-01 Regulation (derived from): National Standards Bulletin 2017 No. 32 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China GB/T 35276-2017: Information security technology -- SM2 cryptography algorithm usage specification---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - SM2 cryptography algorithm usage specification ICS 35.040 L80 National Standards of People's Republic of China Information security technology SM2 cryptographic algorithm specification 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 SM2 key pair 1 5.1 SM2 Private Key 1 5.2 SM2 public key 2 6 data conversion 2 6.1 bit string to 8 byte string conversion 2 6.2 8 byte string to bit string conversion 2 6.3 Integer to octet string conversion 2 6.4 8-bit byte string to integer conversion 2 7 data format 3 7.1 Key data format 3 7.2 Encrypted data format 3 7.3 Signature Data Format 3 7.4 Key Pair Protection Data Format 3 8 pretreatment 4 8.1 Pretreatment 1 4 8.2 Preprocessing 2 4 9 calculation process 4 9.1 Generate Key 4 9.2 Encryption 5 9.3 Decryption 5 9.4 Digital Signature 5 9.5 Signature Verification 5 9.6 Key Agreement 5 10 User ID ID default value 7 ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted. Beijing Haitai radius Technology Co., Ltd., Guardian Information Industry Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Xing Tang Communication Technology Co., Ltd., Shandong De An Information Technology Co., Ltd., Shanghai Geer Software Co., Ltd. the company. The main drafters of this standard. Liu Ping, Jiang Hongyu, Liu Zengshou, Li Yuanzheng, Xu Qiang, Tan Wuzheng, Kongfan Yu, Wang Nina.IntroductionThe SM2 elliptic curve public-key cryptosystem (SM2) is a set of asymmetric algorithms given by GB/T 32918 which includes SM2-1 elliptic curve digital signature algorithm, SM2-2 elliptic curve key agreement protocol, SM2-3 elliptic curve encryption algorithm. The aim of this standard is to ensure the correctness of the use of SM2 and to develop a uniform data format and use for the SM2 cryptographic algorithm method. The SM3 algorithm involved in this standard refers to a cryptographic hash algorithm given in GB/T 32905. This standard only from the point of view of the algorithm gives SM2 password algorithm instructions, does not involve SM2 password algorithm specific preparation detail. Information security technology SM2 cryptographic algorithm specification1 ScopeThis standard specifies the use of SM2 password algorithm, as well as the key, encryption and signature data formats. This standard applies to the use of SM2 cipher algorithm, as well as the development and testing of equipment and systems that support the SM2 cipher algorithm.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Information Security Technology SM3 Cryptographic Hash Algorithm GB/T 32918.1-2016 Information security technology SM2 elliptic curve public key cryptography algorithm Part 1. General Information security technology SM2 elliptic curve public key cryptography algorithm Part 2. Digital signature algorithm GB/T 32918.3-2016 Information security technology SM2 elliptic curve public key cryptographic algorithm Part 3. Key exchange protocol Information security technology SM2 elliptic curve public key cryptography algorithm Part 4 Public key encryption algorithm GB/T 32918.5-2017 Information security technology SM2 elliptic curve public key cryptography Part 5. Definition of parameters3 Terms and definitionsThe following terms and definitions apply to this document. 3.1 Algorithm identification algorithmidentifier Digital information used to indicate algorithmic mechanisms. 3.2 SM2 password algorithm SM2cryptographicalgorithm An algorithm defined by GB/T 32918 (all parts). 3.3 SM3 password algorithm SM3cryptographicalgorithm An algorithm defined by GB/T 32905-2016.4 AbbreviationsThe following abbreviations apply to this document. ECB. Codebook Mode (ElectronicsCodeBook) ECC. Elliptic Curve Cryptography Algorithm (ElipticCurveCryptography) 5 SM2 key pair 5.1 SM2 private key The SM2 private key is an integer greater than 1 and less than n-1 (n is the order of the SM2 algorithm, see value 2 of GB/T 32918.5-2017 ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 35276-2017_English be delivered?Answer: Upon your order, we will start to translate GB/T 35276-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 35276-2017_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 35276-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |