HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (28 Jun 2025)

GB/T 35275-2017 English PDF

Standard Briefing:

Stadard ID: GB/T 35275-2017
Stadard Title: Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification
Price (USD): 279
Lead day (Deliver True-PDF English version): 3 days [Need to translate]
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 35275-2017English279 Add to Cart 3 days [Need to translate] Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification Valid GB/T 35275-2017

PDF Samples:


Basic Data:

Standard ID GB/T 35275-2017 (GB/T35275-2017)
Description (Translated English) Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 14,169
Date of Issue 2017-12-29
Date of Implementation 2018-07-01
Regulation (derived from) National Standards Bulletin 2017 No. 32
Issuing agency(ies) People's Republic of China General Administration of Quality Supervision, Inspection and Quarantine, China National Standardization Administration

Similar Standards:

GB/T 34953.4   GB/T 35273   GB/T 34953.2   GB/T 35282   GB/T 35274   

Contents, Scope, and Excerpt:

GB/T 35275-2017 Information security technology - SM2 cryptographic algorithm encrypted signature message syntax specification ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology SM2 password algorithm Encrypted signature message syntax specification 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ 1 range 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 OID definition 1 6 basic type definition 2 6.1 CertificateRevocationLists 2 6.2 ContentEncryptionAlgorithmIdentifier 2 6.3 DigestAlgorithmIdentifier 2 6.4 DigestEncryptionAlgorithmIdentifier 2 6.5 ExtendedCertificateOrCertificate 2 6.6 ExtendedCertificatesAndCertificates 3 6.7 IssuerAndSerialNumber 3 6.8 KeyEncryptionAlgorithmIdentifier 3 6.9 Version 3 6.10 ContentInfo 3 7 Data Type (Data) 3 8 signed data type (signedData) 4 8.1 signedData type 4 8.2 signerInfo type 4 9 digital envelope data type (envelopedData) 5 9.1 envelopedData type 5 9.2 recipientInfo type 6 10 Signature and digital envelope data type (signedAndEnvelopedData) 6 11 encrypted data type (encryptedData) 7 12 key agreement type (keyAgreementInfo) 7 13 SM2 Key Format 9

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted unit. Shanghai Gel Software Co., Ltd., Shanghai Digital Certificate Certification Center Co., Ltd., Beijing Digital Certification Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Chengdu Wei Shi Tong Information Industry Co., Ltd., Beijing Haitai Fangyueke Technology Co., Ltd., Xing Tang Communication Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., National Information Security Engineering Technology Research Center. The main drafters of this standard. Liu Ping, Zheng Qiang, Yang Wenshan, Han Wei, Fu Dapeng, Li Yuanzheng, Jiang Hongyu, Xu Mingyi, Wang Nina, Kongfan Yu, Yuan Feng. Information Security Technology SM2 password algorithm Encrypted signature message syntax specification

Scope

This standard defines the cryptographic signature message syntax using the SM2 cryptographic algorithm. This standard applies to the use of SM2 cipher algorithm encryption and signature operation of the results of the standardized package.

Normative References

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article For all undated references, the latest edition (including all amendments) applies to this document. GB/T 32905 Information Security Technology SM3 cryptographic hash algorithm GB/T 32918 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Crypto Algorithm GB/T 35276 Information security technology SM2 password algorithm specification GB/T 33560 Information security technology password application identification specifications PKCS 5 OID definition This standard of 6 objects data, signedData, envelopedData, signedAndEnvelopedData, encryptedData and