HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

GB/T 41389-2022 English PDF

US$419.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 41389-2022: Information security technology - SM9 cryptographic algorithm application specification
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 41389-2022English419 Add to Cart 4 days [Need to translate] Information security technology - SM9 cryptographic algorithm application specification Valid GB/T 41389-2022

PDF similar to GB/T 41389-2022


Standard similar to GB/T 41389-2022

GB/T 41819   GB/T 41871   GB/T 41479   GB/T 41387   

Basic data

Standard ID GB/T 41389-2022 (GB/T41389-2022)
Description (Translated English) Information security technology - SM9 cryptographic algorithm application specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Word Count Estimation 21,269
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 41389-2022: Information security technology - SM9 cryptographic algorithm application specification


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology -- SM9 cryptographic algorithm application specification ICS 35.030 CCSL80 National Standards of People's Republic of China Information Security Technology SM9 Cipher Algorithm Usage Specification Published on 2022-04-15 2022-11-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface I 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols and Abbreviations 2 5 SM9 key pair 2 5.1 Generator 2 5.2 SM9 master private key 2 5.3 SM9 master public key 2 5.4 SM9 user private key 3 5.5 SM9 user public key 3 6 Technical requirements 3 6.1 Data Format 3 6.2 Preprocessing 5 6.3 Calculation process 7 7 Validation method 11 7.1 Data format 11 7.2 Preprocessing 11 7.3 Calculation process 12 Appendix A (normative) Data Format Coding Test Case 14

foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document is drafted by. Beijing Guomai Xin'an Technology Co., Ltd., Shanghai Information Security Engineering Technology Research Center, Shenzhen Olympic Union Information Security All Technology Co., Ltd., Wuxi Huazheng Skynet Information Security System Co., Ltd., State Grid Blockchain Technology (Beijing) Co., Ltd. The main drafters of this document. Yuan Feng, Wang Xiaochun, Feng Weiduan, Zhang Liyuan, Wang Xuejin, Yaole, Jiang Nan, Cheng Chaohui, Cai Xianyong, Wang Yiqu, Wang Dong. Information Security Technology SM9 Cipher Algorithm Usage Specification

1 Scope

This document specifies the requirements for the use of the SM9 cryptographic algorithm, and describes the key, encryption and signature data formats. This document applies to the correct and standardized use of the SM9 cryptographic algorithm, as well as to guide the development and development of equipment and systems for the SM9 cryptographic algorithm. detection.

2 Normative references

The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to this document. GB/T 16262.1-2006 Information Technology Abstract Syntax Notation 1 (ASN.1) Part 1.Basic Notation Specification GB/T 17964 Information Security Technology Block Cipher Algorithm Working Mode GB/T 32905 Information Security Technology SM3 Cryptographic Hash Algorithm GB/T 32907 Information Security Technology SM4 Block Cipher Algorithm GB/T 32915 Information Security Technology Binary Sequence Randomness Detection Method GB/T 35276-2017 Information Security Technology SM2 Cryptographic Algorithm Usage Specification GB/T 38635.1-2020 Information Security Technology SM9 Identification Cryptographic Algorithm Part 1.General Provisions GB/T 38635.2-2020 Information Security Technology SM9 Identification Cryptographic Algorithms Part 2.Algorithms

3 Terms and Definitions

The following terms and definitions apply to this document. 3.1 SM9 algorithmSM9algorithm An identity-based elliptic curve public key cryptography algorithm. 3.2 signature master key signaturemasterkey The root signing key pair for the key management infrastructure. Note. Including the signature master private key and signature master public key, which are used for digital signature, signature verification and generation of user signature key for users. 3.3 encryption master key encryptionmasterkey The root encryption key pair for the key management infrastructure. Note. Including the encryption master private key and encryption master public key for data encryption, decryption and generation of user encryption keys for users. 3.4 usersignaturekey User's signing key pair.


Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information