|
US$419.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 41389-2022: Information security technology - SM9 cryptographic algorithm application specification Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 41389-2022 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology - SM9 cryptographic algorithm application specification
| Valid |
GB/T 41389-2022
|
PDF similar to GB/T 41389-2022
Basic data | Standard ID | GB/T 41389-2022 (GB/T41389-2022) | | Description (Translated English) | Information security technology - SM9 cryptographic algorithm application specification | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Word Count Estimation | 21,269 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 41389-2022: Information security technology - SM9 cryptographic algorithm application specification ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology -- SM9 cryptographic algorithm application specification
ICS 35.030
CCSL80
National Standards of People's Republic of China
Information Security Technology
SM9 Cipher Algorithm Usage Specification
Published on 2022-04-15
2022-11-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration
directory
Preface I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Symbols and Abbreviations 2
5 SM9 key pair 2
5.1 Generator 2
5.2 SM9 master private key 2
5.3 SM9 master public key 2
5.4 SM9 user private key 3
5.5 SM9 user public key 3
6 Technical requirements 3
6.1 Data Format 3
6.2 Preprocessing 5
6.3 Calculation process 7
7 Validation method 11
7.1 Data format 11
7.2 Preprocessing 11
7.3 Calculation process 12
Appendix A (normative) Data Format Coding Test Case 14
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
drafted.
Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This document is drafted by. Beijing Guomai Xin'an Technology Co., Ltd., Shanghai Information Security Engineering Technology Research Center, Shenzhen Olympic Union Information Security
All Technology Co., Ltd., Wuxi Huazheng Skynet Information Security System Co., Ltd., State Grid Blockchain Technology (Beijing) Co., Ltd.
The main drafters of this document. Yuan Feng, Wang Xiaochun, Feng Weiduan, Zhang Liyuan, Wang Xuejin, Yaole, Jiang Nan, Cheng Chaohui, Cai Xianyong, Wang Yiqu,
Wang Dong.
Information Security Technology
SM9 Cipher Algorithm Usage Specification
1 Scope
This document specifies the requirements for the use of the SM9 cryptographic algorithm, and describes the key, encryption and signature data formats.
This document applies to the correct and standardized use of the SM9 cryptographic algorithm, as well as to guide the development and development of equipment and systems for the SM9 cryptographic algorithm.
detection.
2 Normative references
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations
documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to
this document.
GB/T 16262.1-2006 Information Technology Abstract Syntax Notation 1 (ASN.1) Part 1.Basic Notation Specification
GB/T 17964 Information Security Technology Block Cipher Algorithm Working Mode
GB/T 32905 Information Security Technology SM3 Cryptographic Hash Algorithm
GB/T 32907 Information Security Technology SM4 Block Cipher Algorithm
GB/T 32915 Information Security Technology Binary Sequence Randomness Detection Method
GB/T 35276-2017 Information Security Technology SM2 Cryptographic Algorithm Usage Specification
GB/T 38635.1-2020 Information Security Technology SM9 Identification Cryptographic Algorithm Part 1.General Provisions
GB/T 38635.2-2020 Information Security Technology SM9 Identification Cryptographic Algorithms Part 2.Algorithms
3 Terms and Definitions
The following terms and definitions apply to this document.
3.1
SM9 algorithmSM9algorithm
An identity-based elliptic curve public key cryptography algorithm.
3.2
signature master key signaturemasterkey
The root signing key pair for the key management infrastructure.
Note. Including the signature master private key and signature master public key, which are used for digital signature, signature verification and generation of user signature key for users.
3.3
encryption master key encryptionmasterkey
The root encryption key pair for the key management infrastructure.
Note. Including the encryption master private key and encryption master public key for data encryption, decryption and generation of user encryption keys for users.
3.4
usersignaturekey
User's signing key pair.
|