2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 41389-2022
GB/T 41389-2022   Information security technology—SM9 cryptographic algorithm application specification (English Version)
Standard No.: GB/T 41389-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 11500 words Translation Price(USD):345.0 remind me the price change

Email:

Implemented on:2022-11-1 Delivery: via email in 1 business day

→ → →

,,2022-11-1,34BB87CE6C4CDFF11650938977253
Standard No.: GB/T 41389-2022
English Name: Information security technology—SM9 cryptographic algorithm application specification
Chinese Name: 信息安全技术 SM9密码算法使用规范
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2022-4-15
Implemented on: 2022-11-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 11500 words
Translation Price(USD): 345.0
Delivery: via email in 1 business day
GB/T 41389-2022 Information security technology - SM9 cryptographic algorithm application specification 1 Scope This document specifies the usage requirements of SM9 cryptographic algorithm, and describes the data formats of key, encryption and signature. It is applicable to correct and normative use of SM9 cryptographic algorithm, as well as the guidance for developing and detecting devices and systems that use the SM9 cryptographic algorithm. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 16262.1-2006 Information technology - Abstract Syntax Notation One (ASN.1) - Part 1: Specification of basic notation GB/T 17964 Information security technology - Modes of operation for a block cipher GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm GB/T 32907 Information security technology - SM4 block cipher algorithm GB/T 32915 Information security technology - Randomness test methods for binary sequence GB/T 35276-2017 Information security technology - SM2 cryptographic algorithm usage specification GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1 SM9 algorithm public key cryptographic algorithm based on elliptic curve of identity 3.2 signature master key root signature key pair for the key management infrastructure Note: Including signature master private key and signature master public key, used for digital signature, signature verification and user signature key generation. 3.3 encryption master key root encryption key pair for the key management infrastructure Note: Including encryption master private key and encryption master public key, used for data encryption, decryption and user encryption key generation. 3.4 user signature key signature key pair for user
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Symbols and abbreviated terms 5 Key pair of SM9 5.1 Generating element 5.2 SM9 master private key 5.3 SM9 master public key 5.4 SM9 user private key 5.5 SM9 user public key 6 Technical requirements 6.1 Data format 6.2 Preprocessing 6.3 Calculation process 7 Verification method 7.1 Data format 7.2 Preprocessing 7.3 Calculation process Annex A (Normative) Examples for test of data format encoding
Referred in GB/T 41389-2022:
*GB/T 16262.1-2006 Information technology - Abstract Syntax Notation One (ASN.1) - Part 1: Specification of basic notation
*GB/T 17964-2021 Information security technology—Modes of operation for a block cipher
*GB/T 32905-2016 Information security technology SM3 cryptographic hash algorithm
*GB/T 32907-2016 Information security techno1ogy--SM4 b1ock cipher algorithm
*GB/T 32915-2016 Information security technology - Binary sequence randomness detection method
*GB/T 35276-2017 Information security technology―SM2 cryptography algorithm usage specification
*GB/T 38635.1-2020 Information security technology—Identity-based cryptographic algorithms SM9—Part 1:General
*GB/T 38635.2-2020 Information security technology—Identity-based cryptographic algorithms SM9—Part 2:Algorithms
GB/T 41389-2022 is referred in:
*GB/T 43578-2023 Information security technology—Universal cryptography service interface specification
Code of China
Standard
GB/T 41389-2022  Information security technology—SM9 cryptographic algorithm application specification (English Version)
Standard No.GB/T 41389-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count11500 words
Price(USD)345.0
Implemented on2022-11-1
Deliveryvia email in 1 business day
Detail of GB/T 41389-2022
Standard No.
GB/T 41389-2022
English Name
Information security technology—SM9 cryptographic algorithm application specification
Chinese Name
信息安全技术 SM9密码算法使用规范
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2022-4-15
Implemented on
2022-11-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
11500 words
Price(USD)
345.0
Keywords
GB/T 41389-2022, GB 41389-2022, GBT 41389-2022, GB/T41389-2022, GB/T 41389, GB/T41389, GB41389-2022, GB 41389, GB41389, GBT41389-2022, GBT 41389, GBT41389
Introduction of GB/T 41389-2022
GB/T 41389-2022 Information security technology - SM9 cryptographic algorithm application specification 1 Scope This document specifies the usage requirements of SM9 cryptographic algorithm, and describes the data formats of key, encryption and signature. It is applicable to correct and normative use of SM9 cryptographic algorithm, as well as the guidance for developing and detecting devices and systems that use the SM9 cryptographic algorithm. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 16262.1-2006 Information technology - Abstract Syntax Notation One (ASN.1) - Part 1: Specification of basic notation GB/T 17964 Information security technology - Modes of operation for a block cipher GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm GB/T 32907 Information security technology - SM4 block cipher algorithm GB/T 32915 Information security technology - Randomness test methods for binary sequence GB/T 35276-2017 Information security technology - SM2 cryptographic algorithm usage specification GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1 SM9 algorithm public key cryptographic algorithm based on elliptic curve of identity 3.2 signature master key root signature key pair for the key management infrastructure Note: Including signature master private key and signature master public key, used for digital signature, signature verification and user signature key generation. 3.3 encryption master key root encryption key pair for the key management infrastructure Note: Including encryption master private key and encryption master public key, used for data encryption, decryption and user encryption key generation. 3.4 user signature key signature key pair for user
Contents of GB/T 41389-2022
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Symbols and abbreviated terms 5 Key pair of SM9 5.1 Generating element 5.2 SM9 master private key 5.3 SM9 master public key 5.4 SM9 user private key 5.5 SM9 user public key 6 Technical requirements 6.1 Data format 6.2 Preprocessing 6.3 Calculation process 7 Verification method 7.1 Data format 7.2 Preprocessing 7.3 Calculation process Annex A (Normative) Examples for test of data format encoding
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 41389-2022, GB 41389-2022, GBT 41389-2022, GB/T41389-2022, GB/T 41389, GB/T41389, GB41389-2022, GB 41389, GB41389, GBT41389-2022, GBT 41389, GBT41389