Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 35276-2017 English PDF

US$199.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 35276-2017: Information security technology -- SM2 cryptography algorithm usage specification
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 35276-2017199 Add to Cart 3 days Information security technology -- SM2 cryptography algorithm usage specification Valid

Similar standards

GB/T 34953.4   GB/T 35273   GB/T 34953.2   GB/T 35282   GB/T 35274   

Basic data

Standard ID: GB/T 35276-2017 (GB/T35276-2017)
Description (Translated English): Information security technology -- SM2 cryptography algorithm usage specification
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 10,135
Date of Issue: 2017-12-29
Date of Implementation: 2018-07-01
Regulation (derived from): National Standards Bulletin 2017 No. 32
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China

GB/T 35276-2017: Information security technology -- SM2 cryptography algorithm usage specification


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - SM2 cryptography algorithm usage specification ICS 35.040 L80 National Standards of People's Republic of China Information security technology SM2 cryptographic algorithm specification 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 SM2 key pair 1 5.1 SM2 Private Key 1 5.2 SM2 public key 2 6 data conversion 2 6.1 bit string to 8 byte string conversion 2 6.2 8 byte string to bit string conversion 2 6.3 Integer to octet string conversion 2 6.4 8-bit byte string to integer conversion 2 7 data format 3 7.1 Key data format 3 7.2 Encrypted data format 3 7.3 Signature Data Format 3 7.4 Key Pair Protection Data Format 3 8 pretreatment 4 8.1 Pretreatment 1 4 8.2 Preprocessing 2 4 9 calculation process 4 9.1 Generate Key 4 9.2 Encryption 5 9.3 Decryption 5 9.4 Digital Signature 5 9.5 Signature Verification 5 9.6 Key Agreement 5 10 User ID ID default value 7

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted. Beijing Haitai radius Technology Co., Ltd., Guardian Information Industry Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Xing Tang Communication Technology Co., Ltd., Shandong De An Information Technology Co., Ltd., Shanghai Geer Software Co., Ltd. the company. The main drafters of this standard. Liu Ping, Jiang Hongyu, Liu Zengshou, Li Yuanzheng, Xu Qiang, Tan Wuzheng, Kongfan Yu, Wang Nina.

Introduction

The SM2 elliptic curve public-key cryptosystem (SM2) is a set of asymmetric algorithms given by GB/T 32918 which includes SM2-1 elliptic curve digital signature algorithm, SM2-2 elliptic curve key agreement protocol, SM2-3 elliptic curve encryption algorithm. The aim of this standard is to ensure the correctness of the use of SM2 and to develop a uniform data format and use for the SM2 cryptographic algorithm method. The SM3 algorithm involved in this standard refers to a cryptographic hash algorithm given in GB/T 32905. This standard only from the point of view of the algorithm gives SM2 password algorithm instructions, does not involve SM2 password algorithm specific preparation detail. Information security technology SM2 cryptographic algorithm specification

1 Scope

This standard specifies the use of SM2 password algorithm, as well as the key, encryption and signature data formats. This standard applies to the use of SM2 cipher algorithm, as well as the development and testing of equipment and systems that support the SM2 cipher algorithm.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Information Security Technology SM3 Cryptographic Hash Algorithm GB/T 32918.1-2016 Information security technology SM2 elliptic curve public key cryptography algorithm Part 1. General Information security technology SM2 elliptic curve public key cryptography algorithm Part 2. Digital signature algorithm GB/T 32918.3-2016 Information security technology SM2 elliptic curve public key cryptographic algorithm Part 3. Key exchange protocol Information security technology SM2 elliptic curve public key cryptography algorithm Part 4 Public key encryption algorithm GB/T 32918.5-2017 Information security technology SM2 elliptic curve public key cryptography Part 5. Definition of parameters

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Algorithm identification algorithmidentifier Digital information used to indicate algorithmic mechanisms. 3.2 SM2 password algorithm SM2cryptographicalgorithm An algorithm defined by GB/T 32918 (all parts). 3.3 SM3 password algorithm SM3cryptographicalgorithm An algorithm defined by GB/T 32905-2016.

4 Abbreviations

The following abbreviations apply to this document. ECB. Codebook Mode (ElectronicsCodeBook) ECC. Elliptic Curve Cryptography Algorithm (ElipticCurveCryptography) 5 SM2 key pair 5.1 SM2 private key The SM2 private key is an integer greater than 1 and less than n-1 (n is the order of the SM2 algorithm, see value 2 of GB/T 32918.5-2017
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 35276-2017_English be delivered?

Answer: Upon your order, we will start to translate GB/T 35276-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 35276-2017_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 35276-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.