Skip to product information
1 of 6

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GM/T 0081-2020 English PDF (GMT0081-2020)

GM/T 0081-2020 English PDF (GMT0081-2020)

Regular price $275.00 USD
Regular price Sale price $275.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: In 1-minute, 24-hr self-service. Click here GM/T 0081-2020 to get it for Purchase Approval, Bank TT...

GM/T 0081-2020: SM9 cryptographic algorithm encryption and signature message syntax specification

This Document defines the encryption and signature message syntax using the SM9 cryptographic algorithm. This Document is applicable to the standardized encapsulation of operation results when the SM9 algorithm is used for encryption and signature operations.
GM/T 0081-2020
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 38.040
CCS L 80
SM9 Cryptographic Algorithm Encryption and
Signature Message Syntax Specification
ISSUED ON: DECEMBER 28, 2020
IMPLEMENTED ON: JULY 01, 2021
Issued by: State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope ... 5
2 Normative References ... 5
3 Terms and Definitions ... 5
4 Abbreviations ... 6
5 Definition of OID ... 7
6 Definition of Basic Type ... 7
6.1 IdentifierRevocationLists ... 7
6.2 ContentEncryptionAlgorithmIdentifier ... 7
6.3 DigestAlgorithmIdentifier ... 7
6.4 DigestEncryptionAlgorithmIdentifier ... 8
6.5 KeyEncryptionAlgorithmIdentifier ... 8
6.6 Version ... 8
6.7 ContentInfo ... 8
6.8 Identifier ... 8
6.9 Validity ... 10
6.10 IBCSysParamsPublishInfo ... 10
6.11 IDAppAttr ... 11
7 Data Type ... 12
8 Signed Data Type ... 12
8.1 SignedData type ... 12
8.2 SignerInfo type ... 13
9 Digital Enveloped Data Type ... 13
9.1 EnvelopedData type ... 13
9.2 ReceipientInfo type ... 15
10 Signed and Digital Enveloped Data Type (SignedAndEnvelopedData) ... 15 11 Encrypted Data Type (EncryptedData) ... 16
12 Key Agreement Type (KeyAgreementInfo) ... 17
Appendix A (Normative) Structure of Identifier Revocation List (IRL) ... 18 Bibliography ... 21
SM9 Cryptographic Algorithm Encryption and
Signature Message Syntax Specification
1 Scope
This Document defines the encryption and signature message syntax using the SM9 cryptographic algorithm.
This Document is applicable to the standardized encapsulation of operation results when the SM9 algorithm is used for encryption and signature operations. 2 Normative References
The following documents are essential to the application of this Document. For the dated documents, only the versions with the dates indicated are applicable to this Document; for the undated documents, only the latest version (including all the amendments) is applicable to this Document.
GB/T 33560 Information Security Technology - Cryptographic Application
Identifier Criterion Specification
GB/T 38635 (all parts) Information Security Technology - Identity-Based Cryptographic Algorithms SM9
GM/T 0080 SM9 Cryptographic Algorithm Application Specification
GM/Z 4001-2013 Cryptographic Terms
3 Terms and Definitions
For the purposes of this Document, the terms given in GB/T 38635 (all parts) and GM/Z 4001-2013 and the following apply.
3.1 Algorithm identifier
Digitized information that is used to indicate algorithmic mechanisms.
3.2 SM9 algorithm
A cryptographic algorithm of national commercial bilinear pair elliptic curve public key. 3.3 Signature master key
The root signature key pair of the key management infrastructure, including the signature master private key and signature master public key, which is used for digital signature, signature verification and generating user signature key for the users. 3.4 Encryption master key
The root encryption key pair of the key management infrastructure, including the encryption master private key and the encryption master public key, which is used for digital encryption, decryption, and generating user encryption key for users. 3.5 Signature key
Thereof, the private key is generated by the key management infrastructure and distributed to users. This type of key includes user signature private key and signature public key, which are used for digital signature and signature verification. 3.6 Encryption key
Thereof, the private key is generated by the key management infrastructure and distributed to users. This type of key includes user encryption private key and encryption public key, which are used for encryption, decryption and key agreement. 3.7 Identity trust chain
A hierarchical ordered collection of identity application attribute information, in which stores the identity application attribute information from the user terminal to the root KGC.
4 Abbreviations
The following abbreviations are applicable to this Document.
IBC: Identity-Based Cryptography.
IRIs: Internationalized Resource Identifiers.
IRL: Identifier Revocation List.
KGC: Key Generation Centre.
OID: Object Identifier.
Where:
The version item (version) determines the version of the IBCSysParams format. The format mentioned in this document shall be set to 2.
The name item (districtName) is an IA5 string that shall be encoded with URI or IRI. districtSerial represents an integer that can be set by the only available IBC public parameter (for URI or IRI defined by districtName). If a new parameter is announced for districtName, the value of districtSerial shall be greater than the value of districtSerial used before.
The validity period item (validity) determines the life of a specific IBCSysParams example and is determined according to the following:
The values of notBefore and notAfter must be expressed in Greenwich Mean Time and include seconds (for example, the time is expressed as YYYYMMDDHHMMSSZ). Even if the number of seconds is zero, it must be expressed as the nearest number of seconds. The customer must confirm that the date of the IBC public parameter it uses is between the notBefore time and the notAfter time of the IBC public parameter. At the same time, if the date is not in this interval, the parameter used for IBC encryption operation cannot be used.
When the value of IbcPublicParameters, IbcIdentityType or IbcParamExtensions changes an area, the IBC public parameters shall be regenerated and announced. The customer shall retrieve the IBC public parameters within the application configuration interval to ensure the version of the parameters is latest.
The IBCPublicParameters public parameter item is a structure that contains public parameters (corresponding to the IBC algorithm formula supported by PKG). It is defined as follows:
Where:
ibcAlgorithm OID determines the IBC algorithm formula. Two IBC algorithmic OIDs and their publicParameterData structures.
publicParameterData is a DER encoding structure of SM9PublicParameterData, which contains the real encrypted parameters. Its specific structure is as follows:

View full details