Skip to product information
1 of 7

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GM/T 0010-2012 English PDF (GMT0010-2012)

GM/T 0010-2012 English PDF (GMT0010-2012)

Regular price $135.00 USD
Regular price Sale price $135.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: In 1-minute, 24-hr self-service. Click here GM/T 0010-2012 to get it for Purchase Approval, Bank TT...

GM/T 0010-2012: SM2 cryptography message syntax specification

This standard defines the encrypted signature message syntax of using SM2 cryptography algorithm. This standard applies to the standardized assembly of operation results during the use of SM2 cryptography algorithm for encryption and signature.
GM/T 0010-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 35.040
L 80
File No..
SM2 cryptography message syntax specification
ISSUED ON. NOVEMBER 22, 2012
IMPLEMENTED ON. NOVEMBER 22, 2012
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope .. 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 5
5 OID definition .. 6
6 Basic-type definition ... 6
6.1 CertificateRevocationLists ... 6
6.2 ContentEncryptionAlgorithmldentifier .. 6
6.3 DigestAlgorithmIdentifier ... 7
6.4 DigestEncryptionAlgorithmldentifier ... 7
6.5 ExtendedCertificateOrCertificate ... 7
6.6 ExtendedCertificatesAndCertificates ... 7
6.7 IssuerAndSerialNumber .. 7
6.8 KeyEncryptionAlgorithmIdentifier .. 8
6.9 Version .. 8
6.10 ContentInfo ... 8
7 Data-type -- data .. 8
8 Signature data-type -- signedData .. 9
8.1 signedData-type .. 9
8.2 SignerInfo-type ... 9
9 Digital envelope data-type -- envelopedData... 10
9.1 envelopedData-type ... 10
9.2 RecipientInfo-type ... 11
10 Signature and digital envelop data-type -- signedAndEnvelopedData ... 12 11 Encrypted data-type -- encryptedData... 13
12 Key agreement type -- keyAgreementInfo .. 13
Appendix A (Normative) SM2 Key Format ... 15
A.1 Elliptic curve parameters syntax ... 15
A.2 Public-key syntax ... 15
A.3 Private-key syntax... 16
References ... 17
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of State Cryptography Administration.
Main drafting organizations of this Standard. Shanghai Koal Software Co., Ltd., Beijing Haitai Fangyuan Technologies Co., Ltd., Beijing Certificate Authority Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Chengdu Westone Information Industry Inc., Shanghai Electronic Certificate Authority Center Co., Ltd., Xingtang Communication Technology Co., Ltd., Shanghai Yidong Network Information Co., Ltd., Shandong De'an Information Technology Co., Ltd., National Information Security Engineering Center. Main drafters of this Standard. Liu Ping, Tan Wuzheng, Liu Zengshou, Li Shusheng, Xu Qiang, Li Yuanzheng, Liu Cheng, Wang Nina, Xia Dongshan,
Jiang Hongyu, Kong Fanyu, Yuan Feng.
The cryptography algorithms that are involved in this standard are used in accordance with the requirements of state cryptography management
department.
SM2 cryptography message syntax specification
1 Scope
This standard defines the encrypted signature message syntax of using SM2 cryptography algorithm.
This standard applies to the standardized assembly of operation results during the use of SM2 cryptography algorithm for encryption and signature.
2 Normative references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this document. For undated references, the latest edition (including all amendments) applies to this document.
GM/T 0006 cryptography application identification specification
GM/T 0009 SM2 cryptography algorithm application specification
PKCS #6 Extended-Certificate Syntax
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Algorithm identifier
It is used to indicate the digitized information of algorithmic mechanism. 3.2
SM2 algorithm
It is an elliptic curve cryptography algorithm with a key length of 256 bits. 4 Symbols and abbreviations
The following abbreviations apply to this document.
6.8 KeyEncryptionAlgorithmIdentifier
KeyEncryptionAlgorithmIdentifier-type Indicates the encryption algorithm that encrypts symmetric key.
6.9 Version
Version-type Indicates syntax version number.
6.10 ContentInfo
ContentInfo-type indicates common syntax structure of content exchange, the common syntax structure of content exchange is defined as follows.
In which.
The ContentType is an object identifier, as defined in Chapter 5 of this standard. content is optional.
7 Data-type -- data
Data data-type structure is defined as follows.
The Data data-type represents any byte string, such as an ASCII text file. Appendix A
(Normative)
SM2 Key Format
A.1 Elliptic curve parameters syntax
The expression of elliptic curve parameters uses the same ASN.1 definitions as X962, which is defined as follows.
When it is used for SM2 cryptography algorithm expression, only use the expression method of namedCurve. See GM/T 0006 for the OID of SM2
cryptography algorithm curve definition. "
A.2 Public-key syntax
The expression of elliptic curve public key uses the same ASN.1 definition as X962, which is defined as follows.
In which.
algorithm defines the type of public key;
subjectPublicKey defines the actual value of public key;
Algorithmldentifier is the binding of object identifier and parameters, which is defined as follows.
For SM2 cryptography algorithm, see GM/T 0006 for the definition of its OID (algorithm).

View full details