Standard Briefing:Stadard ID: GB/T 35275-2017 Stadard Title: Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification Price (USD): 279 Lead day (Deliver True-PDF English version): 3 days [Need to translate] Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 35275-2017 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification
| Valid |
GB/T 35275-2017
|
PDF Samples:
Basic Data: Standard ID | GB/T 35275-2017 (GB/T35275-2017) | Description (Translated English) | Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.040 | Word Count Estimation | 14,169 | Date of Issue | 2017-12-29 | Date of Implementation | 2018-07-01 | Regulation (derived from) | National Standards Bulletin 2017 No. 32 | Issuing agency(ies) | People's Republic of China General Administration of Quality Supervision, Inspection and Quarantine, China National Standardization Administration |
Contents, Scope, and Excerpt:GB/T 35275-2017
Information security technology - SM2 cryptographic algorithm encrypted signature message syntax specification
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology SM2 password algorithm
Encrypted signature message syntax specification
2017-12-29 Posted
2018-07-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
China National Standardization Administration released
Directory
Foreword Ⅲ
1 range 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 1
5 OID definition 1
6 basic type definition 2
6.1 CertificateRevocationLists 2
6.2 ContentEncryptionAlgorithmIdentifier 2
6.3 DigestAlgorithmIdentifier 2
6.4 DigestEncryptionAlgorithmIdentifier 2
6.5 ExtendedCertificateOrCertificate 2
6.6 ExtendedCertificatesAndCertificates 3
6.7 IssuerAndSerialNumber 3
6.8 KeyEncryptionAlgorithmIdentifier 3
6.9 Version 3
6.10 ContentInfo 3
7 Data Type (Data) 3
8 signed data type (signedData) 4
8.1 signedData type 4
8.2 signerInfo type 4
9 digital envelope data type (envelopedData) 5
9.1 envelopedData type 5
9.2 recipientInfo type 6
10 Signature and digital envelope data type (signedAndEnvelopedData) 6
11 encrypted data type (encryptedData) 7
12 key agreement type (keyAgreementInfo) 7
13 SM2 Key Format 9
ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents.
This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point.
This standard was drafted unit. Shanghai Gel Software Co., Ltd., Shanghai Digital Certificate Certification Center Co., Ltd., Beijing Digital Certification
Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Chengdu Wei Shi Tong Information Industry Co., Ltd., Beijing Haitai Fangyueke
Technology Co., Ltd., Xing Tang Communication Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., National Information Security Engineering Technology Research Center.
The main drafters of this standard. Liu Ping, Zheng Qiang, Yang Wenshan, Han Wei, Fu Dapeng, Li Yuanzheng, Jiang Hongyu, Xu Mingyi, Wang Nina, Kongfan Yu,
Yuan Feng.
Information Security Technology SM2 password algorithm
Encrypted signature message syntax specification
ScopeThis standard defines the cryptographic signature message syntax using the SM2 cryptographic algorithm.
This standard applies to the use of SM2 cipher algorithm encryption and signature operation of the results of the standardized package.
Normative ReferencesThe following documents for the application of this document is essential. For dated references, only the dated version applies to this article
For all undated references, the latest edition (including all amendments) applies to this document.
GB/T 32905 Information Security Technology SM3 cryptographic hash algorithm
GB/T 32918 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Crypto Algorithm
GB/T 35276 Information security technology SM2 password algorithm specification
GB/T 33560 Information security technology password application identification specifications
PKCS
5 OID definition
This standard of 6 objects data, signedData, envelopedData, signedAndEnvelopedData, encryptedData and
|