GM/T 0010-2012 English PDF (GMT0010-2012)
GM/T 0010-2012 English PDF (GMT0010-2012)
Regular price
$135.00 USD
Regular price
Sale price
$135.00 USD
Unit price
/
per
Delivery: 3 seconds. Download true-PDF + Invoice.
Get QUOTATION in 1-minute: Click GM/T 0010-2012
Historical versions: GM/T 0010-2012
Preview True-PDF (Reload/Scroll if blank)
GM/T 0010-2012: SM2 cryptography message syntax specification
GM/T 0010-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
File No..
SM2 cryptography message syntax specification
ISSUED ON. NOVEMBER 22, 2012
IMPLEMENTED ON. NOVEMBER 22, 2012
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope .. 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 5
5 OID definition .. 6
6 Basic-type definition ... 6
6.1 CertificateRevocationLists ... 6
6.2 ContentEncryptionAlgorithmldentifier .. 6
6.3 DigestAlgorithmIdentifier ... 7
6.4 DigestEncryptionAlgorithmldentifier ... 7
6.5 ExtendedCertificateOrCertificate ... 7
6.6 ExtendedCertificatesAndCertificates ... 7
6.7 IssuerAndSerialNumber .. 7
6.8 KeyEncryptionAlgorithmIdentifier .. 8
6.9 Version .. 8
6.10 ContentInfo ... 8
7 Data-type -- data .. 8
8 Signature data-type -- signedData .. 9
8.1 signedData-type .. 9
8.2 SignerInfo-type ... 9
9 Digital envelope data-type -- envelopedData... 10
9.1 envelopedData-type ... 10
9.2 RecipientInfo-type ... 11
10 Signature and digital envelop data-type -- signedAndEnvelopedData ... 12
11 Encrypted data-type -- encryptedData... 13
12 Key agreement type -- keyAgreementInfo .. 13
Appendix A (Normative) SM2 Key Format ... 15
A.1 Elliptic curve parameters syntax ... 15
A.2 Public-key syntax ... 15
A.3 Private-key syntax... 16
References ... 17
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this Standard
may be the subject of patent rights. The issuing authority shall not be held
responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of State
Cryptography Administration.
Main drafting organizations of this Standard. Shanghai Koal Software Co., Ltd.,
Beijing Haitai Fangyuan Technologies Co., Ltd., Beijing Certificate Authority Co.,
Ltd., Wuxi Jiangnan Information Security Engineering Technology Center,
Chengdu Westone Information Industry Inc., Shanghai Electronic Certificate
Authority Center Co., Ltd., Xingtang Communication Technology Co., Ltd.,
Shanghai Yidong Network Information Co., Ltd., Shandong De'an Information
Technology Co., Ltd., National Information Security Engineering Center.
Main drafters of this Standard. Liu Ping, Tan Wuzheng, Liu Zengshou, Li
Shusheng, Xu Qiang, Li Yuanzheng, Liu Cheng, Wang Nina, Xia Dongshan,
Jiang Hongyu, Kong Fanyu, Yuan Feng.
The cryptography algorithms that are involved in this standard are used in
accordance with the requirements of state cryptography management
department.
SM2 cryptography message syntax specification
1 Scope
This standard defines the encrypted signature message syntax of using SM2
cryptography algorithm.
This standard applies to the standardized assembly of operation results during
the use of SM2 cryptography algorithm for encryption and signature.
2 Normative references
The following documents are essential for the application of this document. For
dated references, only the dated version applies to this document. For undated
references, the latest edition (including all amendments) applies to this
document.
GM/T 0006 cryptography application identification specification
GM/T 0009 SM2 cryptography algorithm application specification
PKCS #6 Extended-Certificate Syntax
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Algorithm identifier
It is used to indicate the digitized information of algorithmic mechanism.
3.2
SM2 algorithm
It is an elliptic curve cryptography algorithm with a key length of 256 bits.
4 Symbols and abbreviations
The following abbreviations apply to this document.
6.8 KeyEncryptionAlgorithmIdentifier
KeyEncryptionAlgorithmIdentifier-type Indicates the encryption algorithm that
encrypts symmetric key.
6.9 Version
Version-type Indicates syntax version number.
6.10 ContentInfo
ContentInfo-type indicates common syntax structure of content exchange, the
common syntax structure of content exchange is defined as follows.
In which.
The ContentType is an object identifier, as defined in Chapter 5 of this standard.
content is optional.
7 Data-type -- data
Data data-type structure is defined as follows.
The Data data-type represents any byte string, such as an ASCII text file.
Appendix A
(Normative)
SM2 Key Format
A.1 Elliptic curve parameters syntax
The expression of elliptic curve parameters uses the same ASN.1 definitions as
X962, which is defined as follows.
When it is used for SM2 cryptography algorithm expression, only use the
expression method of namedCurve. See GM/T 0006 for the OID of SM2
cryptography algorithm curve definition. "
A.2 Public-key syntax
The expression of elliptic curve public key uses the same ASN.1 definition as
X962, which is defined as follows.
In which.
algorithm defines the type of public key;
subjectPublicKey defines the actual value of public key;
Algorithmldentifier is the binding of object identifier and parameters, which is
defined as follows.
For SM2 cryptography algorithm, see GM/T 0006 for the definition of its OID
(algorithm).
Get QUOTATION in 1-minute: Click GM/T 0010-2012
Historical versions: GM/T 0010-2012
Preview True-PDF (Reload/Scroll if blank)
GM/T 0010-2012: SM2 cryptography message syntax specification
GM/T 0010-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
File No..
SM2 cryptography message syntax specification
ISSUED ON. NOVEMBER 22, 2012
IMPLEMENTED ON. NOVEMBER 22, 2012
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope .. 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 5
5 OID definition .. 6
6 Basic-type definition ... 6
6.1 CertificateRevocationLists ... 6
6.2 ContentEncryptionAlgorithmldentifier .. 6
6.3 DigestAlgorithmIdentifier ... 7
6.4 DigestEncryptionAlgorithmldentifier ... 7
6.5 ExtendedCertificateOrCertificate ... 7
6.6 ExtendedCertificatesAndCertificates ... 7
6.7 IssuerAndSerialNumber .. 7
6.8 KeyEncryptionAlgorithmIdentifier .. 8
6.9 Version .. 8
6.10 ContentInfo ... 8
7 Data-type -- data .. 8
8 Signature data-type -- signedData .. 9
8.1 signedData-type .. 9
8.2 SignerInfo-type ... 9
9 Digital envelope data-type -- envelopedData... 10
9.1 envelopedData-type ... 10
9.2 RecipientInfo-type ... 11
10 Signature and digital envelop data-type -- signedAndEnvelopedData ... 12
11 Encrypted data-type -- encryptedData... 13
12 Key agreement type -- keyAgreementInfo .. 13
Appendix A (Normative) SM2 Key Format ... 15
A.1 Elliptic curve parameters syntax ... 15
A.2 Public-key syntax ... 15
A.3 Private-key syntax... 16
References ... 17
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this Standard
may be the subject of patent rights. The issuing authority shall not be held
responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of State
Cryptography Administration.
Main drafting organizations of this Standard. Shanghai Koal Software Co., Ltd.,
Beijing Haitai Fangyuan Technologies Co., Ltd., Beijing Certificate Authority Co.,
Ltd., Wuxi Jiangnan Information Security Engineering Technology Center,
Chengdu Westone Information Industry Inc., Shanghai Electronic Certificate
Authority Center Co., Ltd., Xingtang Communication Technology Co., Ltd.,
Shanghai Yidong Network Information Co., Ltd., Shandong De'an Information
Technology Co., Ltd., National Information Security Engineering Center.
Main drafters of this Standard. Liu Ping, Tan Wuzheng, Liu Zengshou, Li
Shusheng, Xu Qiang, Li Yuanzheng, Liu Cheng, Wang Nina, Xia Dongshan,
Jiang Hongyu, Kong Fanyu, Yuan Feng.
The cryptography algorithms that are involved in this standard are used in
accordance with the requirements of state cryptography management
department.
SM2 cryptography message syntax specification
1 Scope
This standard defines the encrypted signature message syntax of using SM2
cryptography algorithm.
This standard applies to the standardized assembly of operation results during
the use of SM2 cryptography algorithm for encryption and signature.
2 Normative references
The following documents are essential for the application of this document. For
dated references, only the dated version applies to this document. For undated
references, the latest edition (including all amendments) applies to this
document.
GM/T 0006 cryptography application identification specification
GM/T 0009 SM2 cryptography algorithm application specification
PKCS #6 Extended-Certificate Syntax
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Algorithm identifier
It is used to indicate the digitized information of algorithmic mechanism.
3.2
SM2 algorithm
It is an elliptic curve cryptography algorithm with a key length of 256 bits.
4 Symbols and abbreviations
The following abbreviations apply to this document.
6.8 KeyEncryptionAlgorithmIdentifier
KeyEncryptionAlgorithmIdentifier-type Indicates the encryption algorithm that
encrypts symmetric key.
6.9 Version
Version-type Indicates syntax version number.
6.10 ContentInfo
ContentInfo-type indicates common syntax structure of content exchange, the
common syntax structure of content exchange is defined as follows.
In which.
The ContentType is an object identifier, as defined in Chapter 5 of this standard.
content is optional.
7 Data-type -- data
Data data-type structure is defined as follows.
The Data data-type represents any byte string, such as an ASCII text file.
Appendix A
(Normative)
SM2 Key Format
A.1 Elliptic curve parameters syntax
The expression of elliptic curve parameters uses the same ASN.1 definitions as
X962, which is defined as follows.
When it is used for SM2 cryptography algorithm expression, only use the
expression method of namedCurve. See GM/T 0006 for the OID of SM2
cryptography algorithm curve definition. "
A.2 Public-key syntax
The expression of elliptic curve public key uses the same ASN.1 definition as
X962, which is defined as follows.
In which.
algorithm defines the type of public key;
subjectPublicKey defines the actual value of public key;
Algorithmldentifier is the binding of object identifier and parameters, which is
defined as follows.
For SM2 cryptography algorithm, see GM/T 0006 for the definition of its OID
(algorithm).