Skip to product information
1 of 5

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GM/T 0001.2-2012 English PDF (GM/T0001.2-2012)

GM/T 0001.2-2012 English PDF (GM/T0001.2-2012)

Regular price $150.00
Regular price Sale price $150.00
Sale Sold out
Shipping calculated at checkout.
GM/T 0001.2-2012: ZUC stream cipher algorithm - Part 2: The ZUC-based confidentiality algorithm
Delivery: 9 seconds. Download (& Email) true-PDF + Invoice.
Get Quotation: Click GM/T 0001.2-2012 (Self-service in 1-minute)
Historical versions (Master-website): GM/T 0001.2-2012
Preview True-PDF (Reload/Scroll-down if blank)

GM/T 0001.2-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
RECORD NO.. 36823-2012
ZUC stream cipher algorithm -
Part 2. The ZUC-based confidentiality algorithm
ISSUED ON. MARCH 21, 2012
IMPLEMENTED ON. MARCH 21, 2012
Issued by. State Cryptography Administration of the People’s Republic of
China
3. No action is required - Full-copy of this standard will be automatically and
immediately delivered to your EMAIL address in 0~60 minutes.
Table of Contents
Foreword ... 3 
1 Scope .. 4 
2 Normative references ... 4 
3 Terms and conventions ... 4 
4 Symbols and abbreviations ... 5 
5 Description of algorithm ... 5 
Annex A (Informative) Algorithmic calculation examples ... 8 
Bibliography ... 10 
Foreword
GM/T 0001, ZUC stream cipher algorithm, comprises three parts.
-- Part 1. Description of algorithm;
-- Part 2. The ZUC-based confidentiality algorithm;
-- Part 3. The ZUC-based integrity algorithm.
This Part is Part 2 of GM/T 0001.
This Part of GM/T 0001 is drafted in accordance with the rules given in GB/T 1.1-2009.
This Part is maintained consistent with the 3GPP LTE confidentiality and integrity
algorithms standard, 128-EEA3 specification (ETSI/SAGE TS 35.221).
Attention is drawn to the possibility that some of the elements of this document may
be the subject of patent rights. The issuer of this document shall not be held
responsible for identifying any or all such patent rights.
Annex A to this Part is informative.
This Part was proposed by and shall be under the jurisdiction of State Cryptography
Administration.
The drafting organizations of this Part. Institute of Software Chinese Academy of
Sciences, The Data Assurance and Communication Security Research Center of
Chinese Academy of Sciences.
The main drafters of this Part. Feng Dengguo, Lin Dongyue, Feng Xiutao, Zhou
Chunfang.
ZUC stream cipher algorithm -
Part 2. The ZUC-based confidentiality algorithm
1 Scope
This Part of GM/T 0001 describes ZUC-based confidentiality algorithm. The
confidentiality algorithm applies to encryption and decryption in 3GPP LTE
communication. This Part can be used as guidance for the development, testing and
use of ZUC-based confidentiality algorithm related products.
2 Normative references
The following referenced documents are indispensable for the application of this
document. For dated references, only the edition dated applies to this document. For
undated references, the latest edition of the referenced documents (including all
amendments) applies to This Standard.
GM/T 0001.1-2012, ZUC stream cipher algorithm - Part 1. Description of the algorithm
3 Terms and conventions
For the purposes of this Part, the following terms and conventions apply.
3.1
bit
Binary characters 0 and 1 are called bits.
3.2
byte
Bit string which comprises 8 bits, is called byte.
3.3
word
Bit strings which comprise not less than 2 (including 2) bits, are called words.
This Part mainly adopts 31-bit words and 32-bit words.
3.4
word representation
The words of this Part are represented in the decimal format by default. When the
words are represented in other systems, indicators are always added before or after
word representations. For example. the prefix 0x indicates that the word is represented
in the hexadecimal format; and the suffix subscript 2 indicates that the word is
represented in the binary format.
2.5
bit ordering
This Part specifies that the most significant bit is located on the leftmost of word
representations; and that the least significant bit is located on the rightmost of word
representations.
4 Symbols and abbreviations
4.1 Operation notations
Bitwise exclusive-OR operation
Concatenation of character strings
The minimum integer not less than x
4.2 Abbreviations
The following abbreviations apply to this Part.
CK Key to ZUC-based confidentiality algorithm
KEY Initial key to ZUC
IV Initial vector of ZUC
IBS Input bit stream
OBS Output bit stream
5 Description of algorithm
5.1 Input and output of algorithm
GM/T 0001.2-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
RECORD NO.. 36823-2012
ZUC stream cipher algorithm -
Part 2. The ZUC-based confidentiality algorithm
ISSUED ON. MARCH 21, 2012
IMPLEMENTED ON. MARCH 21, 2012
Issued by. State Cryptography Administration of the People’s Republic of
China
3. No action is required - Full-copy of this standard will be automatically and
immediately delivered to your EMAIL address in 0~60 minutes.
Table of Contents
Foreword ... 3 
1 Scope .. 4 
2 Normative references ... 4 
3 Terms and conventions ... 4 
4 Symbols and abbreviations ... 5 
5 Description of algorithm ... 5 
Annex A (Informative) Algorithmic calculation examples ... 8 
Bibliography ... 10 
Foreword
GM/T 0001, ZUC stream cipher algorithm, comprises three parts.
-- Part 1. Description of algorithm;
-- Part 2. The ZUC-based confidentiality algorithm;
-- Part 3. The ZUC-based integrity algorithm.
This Part is Part 2 of GM/T 0001.
This Part of GM/T 0001 is drafted in accordance with the rules given in GB/T 1.1-2009.
This Part is maintained consistent with the 3GPP LTE confidentiality and integrity
algorithms standard, 128-EEA3 specification (ETSI/SAGE TS 35.221).
Attention is drawn to the possibility that some of the elements of this document may
be the subject of patent rights. The issuer of this document shall not be held
responsible for identifying any or all such patent rights.
Annex A to this Part is informative.
This Part was proposed by and shall be under the jurisdiction of State Cryptography
Administration.
The drafting organizations of this Part. Institute of Software Chinese Academy of
Sciences, The Data Assurance and Communication Security Research Center of
Chinese Academy of Sciences.
The main drafters of this Part. Feng Dengguo, Lin Dongyue, Feng Xiutao, Zhou
Chunfang.
ZUC stream cipher algorithm -
Part 2. The ZUC-based confidentiality algorithm
1 Scope
This Part of GM/T 0001 describes ZUC-based confidentiality algorithm. The
confidentiality algorithm applies to encryption and decryption in 3GPP LTE
communication. This Part can be used as guidance for the development, testing and
use of ZUC-based confidentiality algorithm related products.
2 Normative references
The following referenced documents are indispensable for the application of this
document. For dated references, only the edition dated applies to this document. For
undated references, the latest edition of the referenced documents (including all
amendments) applies to This Standard.
GM/T 0001.1-2012, ZUC stream cipher algorithm - Part 1. Description of the algorithm
3 Terms and conventions
For the purposes of this Part, the following terms and conventions apply.
3.1
bit
Binary characters 0 and 1 are called bits.
3.2
byte
Bit string which comprises 8 bits, is called byte.
3.3
word
Bit strings which comprise not less than 2 (including 2) bits, are called words.
This Part mainly adopts 31-bit words and 32-bit words.
3.4
word representation
The words of this Part are represented in the decimal format by default. When the
words are represented in other systems, indicators are always added before or after
word representations. For example. the prefix 0x indicates that the word is represented
in the hexadecimal format; and the suffix subscript 2 indicates that the word is
represented in the binary format.
2.5
bit ordering
This Part specifies that the most significant bit is located on the leftmost of word
representations; and that the least significant bit is located on the rightmost of word
representations.
4 Symbols and abbreviations
4.1 Operation notations
Bitwise exclusive-OR operation
Concatenation of character strings
The minimum integer not less than x
4.2 Abbreviations
The following abbreviations apply to this Part.
CK Key to ZUC-based confidentiality algorithm
KEY Initial key to ZUC
IV Initial vector of ZUC
IBS Input bit stream
OBS Output bit stream
5 Description of algorithm
5.1 Input and output of algorithm

View full details