SlideShare a Scribd company logo
1 of 3
Download to read offline
LCS 35.040
L 80
Registration No.: 36826-2012
Cryptography Industry Standard of
the People’s Republic of China
GM/T 003.1-2012
Public Key Cryptographic Algorithm
SM2 Based on Elliptic Curves—Part
1: General
Released on March 21, 2012 Effected on March 21, 2012
Released by National Cryptography Administration
Scratch off and
call
4007065315/8007
060315 to verify
Digital Anti-
counterfeiting
GM/T 0003.1-2012
Table of Contents
Preface................................................................................................................................................I
Introduction...................................................................................................................................... II
1. Scope.............................................................................................................................................1
2. Symbols and Abbreviations ..........................................................................................................1
3. Fields and Elliptic Curves.............................................................................................................2
3.1 Finite Field.............................................................................................................................2
3.2 Elliptic Curve over Finite Field .............................................................................................3
4. Type of Data and Conversion........................................................................................................5
4.1 Type of Data ..........................................................................................................................5
4.2 Conversion.............................................................................................................................5
5. System Parameters of Elliptic Curves and Their Verification.......................................................8
5.1 General Requirements ...........................................................................................................8
5.2 System Parameters of Elliptic Curves on Fp and Their Verification......................................8
5.3 System Parameters of Elliptic Curves on F2
km
and Their Verification...................................9
6. Generation of Key Pair and Verification of Public Key................................................................9
6.1 Generation of Key Pair..........................................................................................................9
6.2 Verification of Public Key .....................................................................................................9
Appendix A (Informative) Background Knowledge of Elliptic Curves..........................................11
A.1 Prime Field Fp.....................................................................................................................11
A.2 Binary Extension Field F2
km
..............................................................................................13
A.3 Multi-point Computation of Elliptic Curve ........................................................................23
A.4 Method for Solving the Problem of Elliptic Curve Discrete Logarithm ............................26
A.5 Compression of Points on Elliptic Curves..........................................................................27
Appendix B (Informative) Number Theory Algorithm...................................................................29
B.1 Finite Field and Modular Operation....................................................................................29
B.2 Polynomial on Finite Field..................................................................................................33
B.3 Elliptic Curve Algorithm.....................................................................................................35
Appendix C (Informative) Example Curves ...................................................................................37
C.1 General Requirements.........................................................................................................37
C.2 Elliptic Curve on Fp ............................................................................................................37
C.3 Elliptic Curve on F2
km
.........................................................................................................37
Appendix D (Informative) Quasi-stochastic Generation and Verification of Equation Parameters
for Elliptic Curves ..........................................................................................................................39
D.1 Quasi-stochastic Generation of Equation Parameters for Elliptic Curves ..........................39
D.2 Verification of Equation Parameters for Elliptic Curves.....................................................40
References.......................................................................................................................................41
Preface
GM/T 0003-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves is
divided into 5 parts as follows:
--Part 1: General Provisions;
--Part 2: Digital Signature Algorithm;
--Part 3: Key Exchange Agreement;
--Part 4: Public Key Cryptography Algorithm;
--Part 5: Definition of Parameters
This part is Part 1 of GM/T 0003.
This part is drafted according to the rules specified in GB/T 1.1-2009.
It must be noted that some contents of this document may involve patents. The institution
issuing this document is not responsible for identifying these patents.
Appendix A, Appendix B, Appendix C and Appendix D to this part are informative
appendices.
This part is brought forward by and under the jurisdiction of the National Cryptography
Administration.
This part is drafted by: Beijing Huada Infosec Technology Co., Ltd., The PLA Information
Engineering University, Data Assurance and Communication Security Research Center of
CAS.
This part is majorly drafted by: Chen Jianhua, Zhu Yuefei, Ye Dingfeng, Hu Lei, Pei
Dingyi, Peng Guohua, Zhang Yajuan, and Zhang Zhenfeng.

More Related Content

Viewers also liked

Viewers also liked (18)

Energy and Environment Policy Whitepaper_published
Energy and Environment Policy Whitepaper_publishedEnergy and Environment Policy Whitepaper_published
Energy and Environment Policy Whitepaper_published
 
MTS Software Brochure
MTS Software BrochureMTS Software Brochure
MTS Software Brochure
 
Factores y agentes de riesgos
Factores y agentes de riesgosFactores y agentes de riesgos
Factores y agentes de riesgos
 
Comercio Internacional
Comercio InternacionalComercio Internacional
Comercio Internacional
 
Presentación de250
Presentación de250Presentación de250
Presentación de250
 
Diferentes acciones de la subversiòn
Diferentes acciones de la subversiònDiferentes acciones de la subversiòn
Diferentes acciones de la subversiòn
 
fenomenos naturales
fenomenos naturalesfenomenos naturales
fenomenos naturales
 
Adicciones
AdiccionesAdicciones
Adicciones
 
Teoría de las relaciones humanas
Teoría de las relaciones humanasTeoría de las relaciones humanas
Teoría de las relaciones humanas
 
Trabajo investigacion
Trabajo investigacionTrabajo investigacion
Trabajo investigacion
 
Teoria contingencial
Teoria contingencialTeoria contingencial
Teoria contingencial
 
Dios presente en nuestras vidas
Dios presente en nuestras vidasDios presente en nuestras vidas
Dios presente en nuestras vidas
 
Bioètica
BioèticaBioètica
Bioètica
 
Sismica y geología
Sismica y geologíaSismica y geología
Sismica y geología
 
Blue Ribbon Panel on Transportation Infrastructure Final Report to Governor P...
Blue Ribbon Panel on Transportation Infrastructure Final Report to Governor P...Blue Ribbon Panel on Transportation Infrastructure Final Report to Governor P...
Blue Ribbon Panel on Transportation Infrastructure Final Report to Governor P...
 
It training
It trainingIt training
It training
 
Sydney Sales Corporation - Introduction
Sydney Sales Corporation - IntroductionSydney Sales Corporation - Introduction
Sydney Sales Corporation - Introduction
 
DOUBLE PAGE SPREAD CODES AND CONVENTIONS
DOUBLE PAGE SPREAD CODES AND CONVENTIONSDOUBLE PAGE SPREAD CODES AND CONVENTIONS
DOUBLE PAGE SPREAD CODES AND CONVENTIONS
 

Similar to 1 Cryptography Industry Standard of the People’s Republic of China

Low Level RF : Digital IQ loop for accelerating cavities
Low Level RF : Digital IQ loop for accelerating cavitiesLow Level RF : Digital IQ loop for accelerating cavities
Low Level RF : Digital IQ loop for accelerating cavitiesGeorge Gautier
 
Q46R-ORP-Monitor O&M Manual.pdf
Q46R-ORP-Monitor O&M Manual.pdfQ46R-ORP-Monitor O&M Manual.pdf
Q46R-ORP-Monitor O&M Manual.pdfENVIMART
 
Q46R-ORP-Monitor.pdf
Q46R-ORP-Monitor.pdfQ46R-ORP-Monitor.pdf
Q46R-ORP-Monitor.pdfENVIMART
 
Q46P-pH-Monitor O&M Manual.pdf
Q46P-pH-Monitor O&M Manual.pdfQ46P-pH-Monitor O&M Manual.pdf
Q46P-pH-Monitor O&M Manual.pdfENVIMART
 
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...Advantec Distribution
 
Ali-Dissertation-5June2015
Ali-Dissertation-5June2015Ali-Dissertation-5June2015
Ali-Dissertation-5June2015Ali Farznahe Far
 
61557874 volume-i-ericsson-umts-rf-optimization-12 dec2003
61557874 volume-i-ericsson-umts-rf-optimization-12 dec200361557874 volume-i-ericsson-umts-rf-optimization-12 dec2003
61557874 volume-i-ericsson-umts-rf-optimization-12 dec2003Mohammad Khamiseh
 
Siemens s7 300-400-simatic couter module cm35
Siemens s7 300-400-simatic couter module cm35Siemens s7 300-400-simatic couter module cm35
Siemens s7 300-400-simatic couter module cm35Dien Ha The
 
3DTV state of the art
3DTV state of the art3DTV state of the art
3DTV state of the artDavid Metge
 
Simocode dp = manual de parametrização e operação
Simocode dp = manual de parametrização e operaçãoSimocode dp = manual de parametrização e operação
Simocode dp = manual de parametrização e operaçãoconfidencial
 
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼HION IT
 
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Advantec Distribution
 
Ap650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAp650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAdvantec Distribution
 
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Advantec Distribution
 
Ap650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAp650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAdvantec Distribution
 
Mpr mss 1 c_user_manual (Alcatel Lucent)
Mpr mss 1 c_user_manual (Alcatel Lucent)Mpr mss 1 c_user_manual (Alcatel Lucent)
Mpr mss 1 c_user_manual (Alcatel Lucent)engramjadislam78
 

Similar to 1 Cryptography Industry Standard of the People’s Republic of China (20)

Low Level RF : Digital IQ loop for accelerating cavities
Low Level RF : Digital IQ loop for accelerating cavitiesLow Level RF : Digital IQ loop for accelerating cavities
Low Level RF : Digital IQ loop for accelerating cavities
 
Q46R-ORP-Monitor O&M Manual.pdf
Q46R-ORP-Monitor O&M Manual.pdfQ46R-ORP-Monitor O&M Manual.pdf
Q46R-ORP-Monitor O&M Manual.pdf
 
Q46R-ORP-Monitor.pdf
Q46R-ORP-Monitor.pdfQ46R-ORP-Monitor.pdf
Q46R-ORP-Monitor.pdf
 
Q46P-pH-Monitor O&M Manual.pdf
Q46P-pH-Monitor O&M Manual.pdfQ46P-pH-Monitor O&M Manual.pdf
Q46P-pH-Monitor O&M Manual.pdf
 
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...
Motorola solutions ap 6521 access point installation guide - wi ng 5.5 versio...
 
Ali-Dissertation-5June2015
Ali-Dissertation-5June2015Ali-Dissertation-5June2015
Ali-Dissertation-5June2015
 
Voip
VoipVoip
Voip
 
61557874 volume-i-ericsson-umts-rf-optimization-12 dec2003
61557874 volume-i-ericsson-umts-rf-optimization-12 dec200361557874 volume-i-ericsson-umts-rf-optimization-12 dec2003
61557874 volume-i-ericsson-umts-rf-optimization-12 dec2003
 
Aviation Control Unit
Aviation Control UnitAviation Control Unit
Aviation Control Unit
 
Siemens s7 300-400-simatic couter module cm35
Siemens s7 300-400-simatic couter module cm35Siemens s7 300-400-simatic couter module cm35
Siemens s7 300-400-simatic couter module cm35
 
3DTV state of the art
3DTV state of the art3DTV state of the art
3DTV state of the art
 
Simocode dp = manual de parametrização e operação
Simocode dp = manual de parametrização e operaçãoSimocode dp = manual de parametrização e operação
Simocode dp = manual de parametrização e operação
 
Final Report
Final ReportFinal Report
Final Report
 
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼
시크 SICK CLV620 1D 산업용 고정식 바코드스캐너 매뉴얼
 
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
 
Ap650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAp650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revd
 
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
Motorola ap650 access point installation guide (part no. 72 e 131207-01 rev. d )
 
Ap650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revdAp650 installation guide_72_e-131207-01_revd
Ap650 installation guide_72_e-131207-01_revd
 
Manual fec standard
Manual fec standardManual fec standard
Manual fec standard
 
Mpr mss 1 c_user_manual (Alcatel Lucent)
Mpr mss 1 c_user_manual (Alcatel Lucent)Mpr mss 1 c_user_manual (Alcatel Lucent)
Mpr mss 1 c_user_manual (Alcatel Lucent)
 

1 Cryptography Industry Standard of the People’s Republic of China

  • 1. LCS 35.040 L 80 Registration No.: 36826-2012 Cryptography Industry Standard of the People’s Republic of China GM/T 003.1-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves—Part 1: General Released on March 21, 2012 Effected on March 21, 2012 Released by National Cryptography Administration Scratch off and call 4007065315/8007 060315 to verify Digital Anti- counterfeiting
  • 2. GM/T 0003.1-2012 Table of Contents Preface................................................................................................................................................I Introduction...................................................................................................................................... II 1. Scope.............................................................................................................................................1 2. Symbols and Abbreviations ..........................................................................................................1 3. Fields and Elliptic Curves.............................................................................................................2 3.1 Finite Field.............................................................................................................................2 3.2 Elliptic Curve over Finite Field .............................................................................................3 4. Type of Data and Conversion........................................................................................................5 4.1 Type of Data ..........................................................................................................................5 4.2 Conversion.............................................................................................................................5 5. System Parameters of Elliptic Curves and Their Verification.......................................................8 5.1 General Requirements ...........................................................................................................8 5.2 System Parameters of Elliptic Curves on Fp and Their Verification......................................8 5.3 System Parameters of Elliptic Curves on F2 km and Their Verification...................................9 6. Generation of Key Pair and Verification of Public Key................................................................9 6.1 Generation of Key Pair..........................................................................................................9 6.2 Verification of Public Key .....................................................................................................9 Appendix A (Informative) Background Knowledge of Elliptic Curves..........................................11 A.1 Prime Field Fp.....................................................................................................................11 A.2 Binary Extension Field F2 km ..............................................................................................13 A.3 Multi-point Computation of Elliptic Curve ........................................................................23 A.4 Method for Solving the Problem of Elliptic Curve Discrete Logarithm ............................26 A.5 Compression of Points on Elliptic Curves..........................................................................27 Appendix B (Informative) Number Theory Algorithm...................................................................29 B.1 Finite Field and Modular Operation....................................................................................29 B.2 Polynomial on Finite Field..................................................................................................33 B.3 Elliptic Curve Algorithm.....................................................................................................35 Appendix C (Informative) Example Curves ...................................................................................37 C.1 General Requirements.........................................................................................................37 C.2 Elliptic Curve on Fp ............................................................................................................37 C.3 Elliptic Curve on F2 km .........................................................................................................37 Appendix D (Informative) Quasi-stochastic Generation and Verification of Equation Parameters for Elliptic Curves ..........................................................................................................................39 D.1 Quasi-stochastic Generation of Equation Parameters for Elliptic Curves ..........................39 D.2 Verification of Equation Parameters for Elliptic Curves.....................................................40 References.......................................................................................................................................41
  • 3. Preface GM/T 0003-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves is divided into 5 parts as follows: --Part 1: General Provisions; --Part 2: Digital Signature Algorithm; --Part 3: Key Exchange Agreement; --Part 4: Public Key Cryptography Algorithm; --Part 5: Definition of Parameters This part is Part 1 of GM/T 0003. This part is drafted according to the rules specified in GB/T 1.1-2009. It must be noted that some contents of this document may involve patents. The institution issuing this document is not responsible for identifying these patents. Appendix A, Appendix B, Appendix C and Appendix D to this part are informative appendices. This part is brought forward by and under the jurisdiction of the National Cryptography Administration. This part is drafted by: Beijing Huada Infosec Technology Co., Ltd., The PLA Information Engineering University, Data Assurance and Communication Security Research Center of CAS. This part is majorly drafted by: Chen Jianhua, Zhu Yuefei, Ye Dingfeng, Hu Lei, Pei Dingyi, Peng Guohua, Zhang Yajuan, and Zhang Zhenfeng.