HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189759 (2 Feb 2025)

GM/T 0092-2020 PDF English


Search result: GM/T 0092-2020 English: PDF (GM/T0092-2020)
Standard IDContents [version]USDSTEP2[PDF] delivered inName of Chinese StandardStatus
GM/T 0092-2020English170 Add to Cart 0-9 seconds. Auto-delivery. Specification of certificate request syntax based on SM2 cryptographic algorithm Valid
BUY with any currencies (Euro, JPY, GBP, KRW etc.): GM/T 0092-2020     Related standards: GM/T 0092-2020

PDF Preview: GM/T 0092-2020


GM/T 0092-2020: PDF in English (GMT 0092-2020)

GM/T 0092-2020 GM CRYPTOGRAPHIC INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 CCS L 80 Specification of certificate request syntax based on SM2 cryptographic algorithm ISSUED ON: DECEMBER 28, 2020 IMPLEMENTED ON: JULY 01, 2021 Issued by: National Cryptography Administration Table of Contents Foreword ... 3  Introduction ... 4  1 Scope ... 5  2 Normative references ... 5  3 Terms and definitions ... 5  4 Abbreviations ... 6  5 Definition of OID ... 6  6 Certificate request syntax ... 7  7 Extended attributes of certificate request information ... 8  8 Certificate response format ... 9  Annex A (normative) ASN.1 syntax ... 10  Bibliography ... 12  Foreword This Standard was drafted in accordance with the rules given in GB/T 1.1-2020 “Directives for standardization - Part 1: Rules for the structure and drafting of standardizing documents”. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights. This Standard was proposed by and shall be under the jurisdiction of Cryptographic Industry Standardization Technical Committee. The drafting organizations of this Standard: Beijing Xin'an Century Technology Co., Ltd., Geer Software Co., Ltd., Beijing Digital Certification Co., Ltd., Changchun Jitai Zhengyuan Information Technology Co., Ltd., Xingtang Communication Technology Co., Ltd., Weishitong Information Industry Co., Ltd., National Information Security Engineering Technology Research Center, Shandong De’an Information Technology Co., Ltd., Beijing Chuangyuan Tiandi Technology Co., Ltd. Main drafters of this Standard: Wang Zongbin, Liu Ting, Zheng Qiang, Fu Dapeng, Zhao Lili, Wang Nina, Zhao Shan, Luo Jun, Zhang Xu, Zhou Shujing, Zhang Qingyong, Jiao Jingwei, Shi Xiaofeng, Ma Hongfu. Specification of certificate request syntax based on SM2 cryptographic algorithm 1 Scope This document defines the certificate request syntax that uses SM2 cryptographic algorithm, the extended attributes of the certificate request information, and the certificate response format. This document is applicable to the development of digital certificate authentication system. When the digital certificate application system uses SM2 cryptographic algorithm for certificate request operations, it encapsulates the standardization of the certificate request syntax. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 31503-2015, Information security technology - Encryption and signature message syntax for electronic document GB/T 32905, Information security technology SM3 cryptographic hash algorithm GB/T 33560-2017, Information security technology - Cryptographic application identifier criterion specification GB/T 35275-2017, Information security technology - SM2 cryptographic algorithm encrypted signature message syntax specification GB/T 35276-2017, Information security technology - SM2 cryptography algorithm usage specification GM/Z 4001, Cryptographic terms 3 Terms and definitions For the purposes of this document, the terms and definitions defined in GM/Z 4001 as well as the followings apply. 3.1 certificate a credible digital document that is digitally signed by an authoritative, credible and impartial third-party certificate certification body recognized by the state 3.2 signature an algorithm defined by GB/T 32905; it is a value generated by an application program that uses a cryptographic algorithm to calculate with a private key; with the characteristics of integrity, message authentication and/or signer authentication 3.3 attributes a collection of object attributes and a related attribute value 4 Abbreviations The following abbreviations apply to this document. ASN.1: Abstract Syntax Notation One BER: Basic Encoding Rule CA: Certificate Authority DER: Distinguished Encoding Rules for ASN.1; DER is a subset of BER OID: Object Identity 5 Definition of OID This document defines the identifiers of the three objects certificationRequestInfo, certificationRequest, and challengePassword, see Table 1. Where, AlgorithmIdentifier here is used to identify the signature algorithm. OBJECTIDENTIFIER identifies the specific algorithm. The content of the optional parameters completely depends on the identified algorithm. The signature algorithm of this document is a signature based on SM2 algorithm and SM3 algorithm, without parameters. Its OID is in accordance with GB/T 33560-2017. The type composition of CertificationRequest is shown in Table 3. The subject sending a certificate application generally occurs after the public and private key pair is generated, or after the subject's distinguished name is changed. When applying for a certificate, the purpose of signing the certificate request information is to prevent the subject from using the other party’s public key for certificate request. The signing process consists of the following two steps: a) The components of CertificationRequestInfo are encoded by DER to generate a byte string; b) The result of a) is signed with the private key of the subject of the certificate request and a specific signature algorithm to generate a bit string, that is, a signature. 7 Extended attributes of certificate request information ChallengePassword attribute type specifies a password. Using this password, the subject can apply for a certificate or revoke the certificate. The challenge password attribute shall have a unique attribute value. ......
 
Source: Above contents are excerpted from the PDF -- translated/reviewed by: www.chinesestandard.net / Wayne Zheng et al.