GB/T 32918.5-2017 Translated English of Chinese Standard. (GBT 32918.5-2017, GB/T32918.5-2017, GBT32918.5-2017): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definitionhttps://www.chinesestandard.net, 14 sept. 2018 - 16 pages This Part of GB/T 32918 specifies the curve parameters of public key cryptographic algorithm SM2 based on elliptic curves. This Part applies to digital signature and verification (SEE Appendix A), key exchange and verification (SEE Appendix B), and example of message encryption and decryption (SEE Appendix C). |
Expressions et termes fréquents
algorithm SM2 based appendix selects Base point based on elliptic bits in length CALCULATE the elliptic Calculation option Option Coordinate x1 Coordinate Coordinate xG Coordinate Coordinate yG Order cryptographic algorithm SM2 cryptographic hash algorithm curve point Coordinate curves Elliptic curve Digital signature algorithm discrete logarithm problem Elliptic curve equation elliptic curve point elliptic curves Elliptic encryption and decryption expressed in hexadecimal Factor a Factor finite field Fp-256 Prime number given in GB/T hash algorithm given Hash value hexadecimal form Information security technology key Coordinate xA key cryptographic algorithm key encryption algorithm Key exchange protocol left and low less than 264 message bit string message encryption number p Factor order is recorded Parameter definition point Coordinate x2 point G Public key Coordinate Public key cryptographic Public key encryption random number recorded as H256 relevant values selects the cryptographic specified in GB/T User A’s value of 256 x1 Coordinate xG Coordinate yG y2=x3+ax+b Example