Skip to product information
1 of 8

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GB/T 32918.3-2016 English PDF (GBT32918.3-2016)

GB/T 32918.3-2016 English PDF (GBT32918.3-2016)

Regular price $145.00 USD
Regular price Sale price $145.00 USD
Sale Sold out
Shipping calculated at checkout.
Delivery: 3 seconds. Download true-PDF + Invoice.
Get QUOTATION in 1-minute: Click GB/T 32918.3-2016
Historical versions: GB/T 32918.3-2016
Preview True-PDF (Reload/Scroll if blank)

GB/T 32918.3-2016: Information security technology -- Public key cryptographic algorithm SM2 based on elliptic curves -- Part 3: Key exchange protocol
GB/T 32918.3-2016
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Information security technology - Public key
cryptographic algorithm SM2 based on elliptic curves
- Part 3. Key exchange protocol
ISSUED ON. AUGUST 29, 2016
IMPLEMENTED ON. MARCH 1, 2017
Issued by. General Administration of Quality Supervision, Inspection and
Quarantine of the PRC;
Standardization Administration of the PRC.
Table of Contents
Foreword ... 3 
Introduction ... 4 
1 Scope ... 6 
2 Normative references ... 6 
3 Terms and definitions ... 6 
4 Symbols and abbreviations ... 7 
5 Algorithm parameters and auxiliary function ... 8 
5.1 Overview ... 8 
5.2 Elliptic curve’s system parameters ... 9 
5.3 User key pair ... 9 
5.4 Auxiliary function ... 9 
5.5 Other information of user ... 10 
6 Key exchange protocol and process ... 11 
6.1 Key exchange protocol ... 11 
6.2 Key exchange protocol process ... 13 
Appendix A (Informative) Example of key exchange and verification ... 15 
A.1 Overview ... 15 
A.2 Elliptic curve’s key exchange protocol on Fp ... 15 
A.3 Elliptic curve’s key exchange protocol on F2m ... 19 
References ... 23 
Introduction
In 1985, N.Koblitz and V.Miller independently proposed the application of elliptic
curves to public key cryptosystems. The nature of the curve on which the elliptic
curve’s public key cryptography is based is as follows.
- The elliptic curve on the finite field forms a finite exchange group under the
point addition operation, its order is similar to the base field size;
- Similar to the power operation in the finite field multiplication group, the
elliptic curve’s multiple-point-multiplication operation constitutes a one-way
function.
In the multiple-point-multiplication operation, the multiple-point-multiplication
and the base point are known, the problem of solving the multiplication is called
the elliptic curve’s discrete logarithm problem. For the discrete logarithm
problem of general elliptic curves, there is only a solution method for
exponential computational complexity. Compared with the large number
decomposition problem and the discrete logarithm problem on the finite field,
the elliptic curve’s discrete logarithm problem is much more difficult to solve.
Therefore, under the same level of security, the elliptic curve cryptography is
much smaller than the key size required for other public key cryptographies.
SM2 is an elliptic curve’s cryptographic algorithm standard which is developed
and proposed by the National Cryptography Authority. The main objectives of
GB/T 32918 are as follows.
- GB/T 32918.1 defines and describes the related concepts and
mathematical basics of the SM2 elliptic curve cryptographic algorithm, and
outlines the relationship between this part and other parts.
- GB/T 32918.2 describes a signature algorithm based on elliptic curve, that
is, the SM2 signature algorithm.
- GB/T 32918.3 describes a key exchange protocol based on elliptic curve,
that is, the SM2 key exchange protocol.
- GB/T 32918.4 describes a public key encryption algorithm based on elliptic
curve, that is, the SM2 encryption algorithm, which uses the SM3
cryptographic hash algorithm as defined in GB/T 32905-2016.
- GB/T 32918.5 gives the elliptic curve parameters used by the SM2
Information security technology - Public key
cryptographic algorithm SM2 based on elliptic curves
- Part 3. Key exchange protocol
1 Scope
This Part of GB/T 32918 specifies the key exchange protocol of public key
cryptographic algorithm SM2 based on elliptic curves, and gives examples of
key exchange and verification and their corresponding processes.
This Part is applicable to the key exchange in commercial cryptographic
application. It can satisfy twice or optional three-times information transfer
process of the communication parties; and calculate and obtain a shared secret
key (session key) jointly determined by both parties.
2 Normative references
The following documents are indispensable for the application of this document.
For the dated references, only the versions with the dates indicated are
applicable to this document. For the undated references, the latest version
(including all the amendments) are applicable to this document.
GB/T 32918.1-2016 Information security technology - Public key
cryptographic algorithm SM2 based on elliptic curves - Part 1. General
GB/T 32905-2016 Information security techniques - SM3 cryptographic hash
algorithm
3 Terms and definitions
The following terms and definitions are applicable to this document.
3.1 Key confirmation from A to B
A guarantee which makes user B be convinced that user A has a specific secret
key.
3.2 Key derivation function
The function of one or more shared secret keys generated by acting on the
shared key and other parameters known to both parties.
3.3 Initiator
The user who sends the first round of exchange information during the
operation of a protocol.
3.4 Responder
The user who does not send the first round of information exchange during the
operation of a protocol.
3.5 Distinguishing identifier
Information which can distinguish an entity’s identity without ambiguity.
4 Symbols and abbreviations
The following symbols apply to this document.
A, B - Two users using the public key cryptosystem.
dA - User A’s private key.
dB - User B’s private key.
E(Fq) - A set of all rational points (including the point at infinity O) of the elliptic
curve E on Fq.
Fq - A finite field which contains q elements.
G - A base point of elliptic curve, of which the order is prime number.
Hash( ) - Cryptographic hash algorithm.
Hv( ) - A cryptographic hash algorithm with a message digest length of v bits.
h - The cofactor, h=#E(Fq)/n, where n is the order of the base point G.
IDA, IDB - Distinguishing identifiers of user A and user B.
K, KA, KB - The shared secret keys agreed upon by the key exchange protocol.
KDF( ) - Key derivation function.
modn - Modulo n operation. For example, 23 mod 7=2.
n - The order of the base point G [n is the prime factor of #E(Fq)].
protocol can be used for key management and negotiation.
5.2 Elliptic curve’s system parameters
Elliptic curve’s system parameters include the size q of the finite field Fq (When
q=2m, it also includes the identification of element representation notation and
the reduced polynomial). Two elements a, b which define the equation of the
elliptic curve E(Fq) shall ∈Fq. The base point G on E(Fq) shall = (xG, yG) (G≠O),
where xG and yG are two elements in Fq; the order n of G and other alternatives
(such as the cofactor h of n, etc.).
Elliptic curve’s system parameters and their verification shall comply with the
provisions of Clause 5 of GB/T 32918.1-2016.
5.3 User’s key pair
User A’s key pair includes its private key dA and public key PA=[dA]G= (xA, yA).
User B’s key pair includes its private key dB and public key PB=[dB]G= (xB, yB).
The generation algorithm of user’s key pair and the public key verification
algorithm shall be in accordance with the provisions of Clause 6 of GB/T
32918.1-2016.
5.4 Auxiliary function
5.4.1 Overview
In the elliptic curve’s key exchange protocol specified in this Part, three types
of auxiliary functions are involved. cryptographic hash algorithm, key derivation
function, and random number generator. The strength of these three types of ...
View full details