GM/T 0044.5-2016 PDF English
US$180.00 · In stock · Download in 9 secondsGM/T 0044.5-2016: Identity-based cryptographic algorithms SM9 - Part 5: Parameter definition Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0044.5-2016 | English | 180 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Identity-based cryptographic algorithms SM9 - Part 5: Parameter definition
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0044.5-2016
GM/T 0044.5-2016: Identity-based cryptographic algorithms SM9 - Part 5: Parameter definition---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0044.5-2016
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
File No.. 55617-2016
Identity-based cryptographic algorithms SM9 -
Part 5. Parameter definition
Issued on: MARCH 28, 2016
Implemented on: MARCH 28, 2016
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative references ... 4
3 Parameter definitions ... 4
Annex A (informative) Example of digital signature algorithm ... 8
Annex B (informative) Example of key exchange protocol ... 15
Annex C (informative) Example of key capsulation mechanism ... 30
Annex D (informative) Example of public key encryption algorithm ... 36
Foreword
GM/T 0044 “Identity-based cryptographic algorithms SM9” consists of five parts.
- Part 1. General;
- Part 2. Digital signature algorithm;
- Part 3. Key exchange protocol;
- Part 4. Key encapsulation mechanism and public key encryption algorithm;
- Part 5. Parameter definition.
This Part is Part 5 of GM/T 0044.
This Part was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document
may be the subject of patent rights. The issuing authority shall not be held
responsible for identifying any or all such patent rights.
This Part was proposed by and shall be under the jurisdiction of Code Industry
Standardization Technical Committee.
Main drafting organization of this Part. National Information Security
Engineering Center.
Main drafters of this Part. Chen Xiao, Ma Ning, Zhang Qingpo, Yuan Wengong,
Liu Ping, Li Zengxin, Wang Xuejin, Yang Hengliang, Xiong Ronghua, Ma Yanli,
Pu Yusan, Tang Ying, Sun Yisheng, An Xuan.
Identity-based cryptographic algorithms SM9 -
Part 5. Parameter definition
1 Scope
This Part of GM/T 0044 specifies the curve parameters of SM9 identity-based
cryptographic algorithm, and gives the example of digital signature algorithm,
key exchange protocol, key encapsulation mechanism and public key
encryption algorithm.
This Part is applicable to the verification of the correctness of each step in the
implementation of SM9 algorithm.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the dated edition cited applies. For
undated references, the latest edition of the referenced document (including all
amendments) applies.
GM/T 0004-2012 SM3 cryptographic hash algorithm
GM/T 0002-2012 SM4 block cipher algorithm
GM/T 0044.1-2016 Identity-based cryptographic algorithms SM9 - Part 1.
General
GM/T 0044.2-2016 Identity-based cryptographic algorithms SM9 - Part 2.
Digital signature algorithm
GM/T 0044.3-2016 Identity-based cryptographic algorithms SM9 - Part 3.
Key exchange protocol
GM/T 0044.4-2016 Identity-based cryptographic algorithms SM9 - Part 4.
Key encapsulation mechanism and public key encryption algorithm
3 Parameter definitions
3.1 System parameters
This Part uses the 256-bit BN curve.
Annex A
(informative)
Example of digital signature algorithm
A.1 General requirements
This annex selects the cryptographic hash function given in GM/T 0004-2012.
The input is a message bit string with less than 264 in length. The output is a
hash value with 256 bits in length, denoted as H256 ( ).
In this annex, for all numbers in hexadecimal, the high bit is on the left and the
low bit is on the right.
In this annex, the message is ASCII encoded.
A.2 Digital signature and verification
Elliptic curve equation. y2 = x3 + b.
Base field characteristics q.
Equation parameter b. 05
Groups G1 and G2’s order N.
Cofactor cf. 1
Number of embeddings k. 12
Twisted curve parameter β. √െ2
Group G1’s generator P1 = (xP1, yP1).
coordinate xP1.
coordinate yP1.
Annex D
(informative)
Example of public key encryption algorithm
D.1 General requirements
This annex selects the cryptographic hash function given in GM/T 0004-2012.
The input is a message bit string with less than 264 in length. The output is a
hash value with 256 bits in length, denoted as H256 ( ).
This annex selects the block cipher function given in GM/T 0002-2012 as the
block cipher algorithm used for encryption. In this example, the block length is
128 bits, the filling method follows PKCS#5, and the work mode is ECB.
In this annex, for all numbers in hexadecimal, the high bit is on the left and the
low bit is on the right.
In this annex, the plaintext is ASCII encoded.
D.2 Public key encryption and decryption
Elliptic curve equation. y2 = x3 + b.
Base field characteristics q.
Equation parameter b. 05
Groups G1 and G2’s order N.
Cofactor cf. 1
Number of embeddings k. 12
Twisted curve parameter β. √െ2
Group G1’s generator P1 = (xP1, yP1).
coordinate xP1.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0044.5-2016 be delivered?Answer: The full copy PDF of English version of GM/T 0044.5-2016 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0044.5-2016_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0044.5-2016_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0044.5-2016 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0044.5-2016?A step-by-step guide to download PDF of GM/T 0044.5-2016_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0044.5-2016". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|