2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0001.3-2012
GM/T 0001.3-2012   ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm (English Version)
Standard No.: GM/T 0001.3-2012 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 5500 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2012-3-21 Delivery: via email in 1 business day

→ → →

,,2012-3-21,C043DACC9171645E1419312914217
Standard No.: GM/T 0001.3-2012
English Name: ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm
Chinese Name: 祖冲之序列密码算法 第3部分:基于祖冲之算法的完整性算法
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2012-03-21
Implemented on: 2012-3-21
Status: valid
Target Language: English
File Format: PDF
Word Count: 5500 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This part of GM/T 0001 describes the integrity algorithm based on the ZUC stream cipher algorithm. It is applicable to the development, testing, and use of products related to the integrity algorithm based on the ZUC stream cipher algorithm. 2 Normative References The following documents are essential for the application of this document. For dated references, only the dated version applies to this document. For undated references, the latest version (including all amendments) applies to this document. GM/T 0001.1 ZUC Stream Cipher Algorithm Part 1: Algorithm Description 3 Terms and Definitions The terms and definitions defined in GM/T 0001.1 apply to this document. 4 Symbols and Abbreviations 4.1 Symbols The following symbols apply to this document: Bitwise XOR operation || String or byte string concatenation 「x7 Smallest integer no less than x ≪ k Left shift by k bits 4.2 Abbreviations The following abbreviations apply to this document: IK: Integrity Key IV: Initial Vector LTE: Long Term Evolution MAC: Message Authentication Code 5 Algorithm Description 5.1 Algorithm Inputs and Outputs The input parameters of this algorithm are shown in Table 1, and the output parameter is shown in Table 2. Table 1 The inputs Parameter Size(bits) Remark IK 128 Integrity key IV 128 Initialization Vector LENGTH 32 Bit length of the input message stream M LENGTH Input message stream with length LENGTH Table 2 The output Parameter Size(bits) Remark MAC 32 The MAC 5.2 Algorithm Workflow 5.2.1 Key Stream Generation Let L =「LENGTH/327 + 2. Using the integrity key (IK) and the initial vector (IV), and L as input parameters and generate a key stream according to the method described in section 5.6 of GM/T 0001.1. Represent the generated key stream as a bit string k[0],k[1], …,k[32× L−1], where k[0] is the highest bit of the first key word and k[31] is the lowest bit of the first key word, continuing in this manner. For i=0,1,2, …,32×(L−1), let ki=k[i] || k[i+1] || … || k[i+31], where ki is a 32-bit word. For 3GPP LTE application scenarios, refer to Appendix A for the initialization method of the initial vector (IV). 5.2.2 MAC Calculation Let Tbe a 32-bit variable. Initialize T=0. For i=0,1, …,LENGTH−1, If M[i]=1, then 。。。 For 3GPP LTE application scenarios, refer to Appendix B for algorithm calculation examples. Appendix A (Informative Appendix) Parameter Initialization in 3GPP LTE
GM/T 0001.3-2012 is referred in:
*GB/T 37092-2018 Information security technology-Security requirements for cryptographic modules
Code of China
Standard
GM/T 0001.3-2012  ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm (English Version)
Standard No.GM/T 0001.3-2012
Statusvalid
LanguageEnglish
File FormatPDF
Word Count5500 words
Price(USD)140.0
Implemented on2012-3-21
Deliveryvia email in 1 business day
Detail of GM/T 0001.3-2012
Standard No.
GM/T 0001.3-2012
English Name
ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm
Chinese Name
祖冲之序列密码算法 第3部分:基于祖冲之算法的完整性算法
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2012-03-21
Implemented on
2012-3-21
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
5500 words
Price(USD)
140.0
Keywords
GM/T 0001.3-2012, GM 0001.3-2012, GMT 0001.3-2012, GM/T0001.3-2012, GM/T 0001.3, GM/T0001.3, GM0001.3-2012, GM 0001.3, GM0001.3, GMT0001.3-2012, GMT 0001.3, GMT0001.3
Introduction of GM/T 0001.3-2012
1 Scope This part of GM/T 0001 describes the integrity algorithm based on the ZUC stream cipher algorithm. It is applicable to the development, testing, and use of products related to the integrity algorithm based on the ZUC stream cipher algorithm. 2 Normative References The following documents are essential for the application of this document. For dated references, only the dated version applies to this document. For undated references, the latest version (including all amendments) applies to this document. GM/T 0001.1 ZUC Stream Cipher Algorithm Part 1: Algorithm Description 3 Terms and Definitions The terms and definitions defined in GM/T 0001.1 apply to this document. 4 Symbols and Abbreviations 4.1 Symbols The following symbols apply to this document: Bitwise XOR operation || String or byte string concatenation 「x7 Smallest integer no less than x ≪ k Left shift by k bits 4.2 Abbreviations The following abbreviations apply to this document: IK: Integrity Key IV: Initial Vector LTE: Long Term Evolution MAC: Message Authentication Code 5 Algorithm Description 5.1 Algorithm Inputs and Outputs The input parameters of this algorithm are shown in Table 1, and the output parameter is shown in Table 2. Table 1 The inputs Parameter Size(bits) Remark IK 128 Integrity key IV 128 Initialization Vector LENGTH 32 Bit length of the input message stream M LENGTH Input message stream with length LENGTH Table 2 The output Parameter Size(bits) Remark MAC 32 The MAC 5.2 Algorithm Workflow 5.2.1 Key Stream Generation Let L =「LENGTH/327 + 2. Using the integrity key (IK) and the initial vector (IV), and L as input parameters and generate a key stream according to the method described in section 5.6 of GM/T 0001.1. Represent the generated key stream as a bit string k[0],k[1], …,k[32× L−1], where k[0] is the highest bit of the first key word and k[31] is the lowest bit of the first key word, continuing in this manner. For i=0,1,2, …,32×(L−1), let ki=k[i] || k[i+1] || … || k[i+31], where ki is a 32-bit word. For 3GPP LTE application scenarios, refer to Appendix A for the initialization method of the initial vector (IV). 5.2.2 MAC Calculation Let Tbe a 32-bit variable. Initialize T=0. For i=0,1, …,LENGTH−1, If M[i]=1, then 。。。 For 3GPP LTE application scenarios, refer to Appendix B for algorithm calculation examples. Appendix A (Informative Appendix) Parameter Initialization in 3GPP LTE
Contents of GM/T 0001.3-2012
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0001.3-2012, GM 0001.3-2012, GMT 0001.3-2012, GM/T0001.3-2012, GM/T 0001.3, GM/T0001.3, GM0001.3-2012, GM 0001.3, GM0001.3, GMT0001.3-2012, GMT 0001.3, GMT0001.3