2025-12-14 216.73.216.3
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0003.5-2012
GM/T 0003.5-2012   Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 5: Parameter Definition (English Version)
Standard No.: GM/T 0003.5-2012 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 7500 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2012-3-21 Delivery: via email in 1 business day

→ → →

,,2012-3-21,E5BB0A6B1172AC761419406608516
Standard No.: GM/T 0003.5-2012
English Name: Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 5: Parameter Definition
Chinese Name: SM2椭圆曲线公钥密码算法 第5部分:参数定义
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2012-03-21
Implemented on: 2012-3-21
Status: valid
Target Language: English
File Format: PDF
Word Count: 7500 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This part of GM/T 0003 specifies the curve parameters of the public key cryptographic algorithm SM2 based on elliptic curves, and gives the examples of digital signature and verification, key exchange and verification, and message encryption and decryption. 2 Parameter Definition SM2 uses the elliptic curve with a 256-bit prime field. Elliptic curve equation: y2=x2+ax+b Curve parameters: p=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 00000000 FFFFFFFF FFFFFFFF a=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 00000000 FFFFFFFF FFFFFFFC b=28E9FA9E 9D9F5E34 4D5A9E4B CF6509A7 F39789F5 15AB8F92 DDBCBD41 4D940E93 n=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF 7203DF6B 21C6052B 53BBF409 39D54123 xG=32C4AE2C 1F198119 5F990446 6A39C994 8FE30BBF F2660BE1 715A4589 334C74C7 yG=BC3736A2 F4F6779C 59BDCEE3 6B692153 D0A9877C C62A4740 02DF32E5 2139F0A0
Foreword i 1 Scope 2 Parameter Definition Annex A (Informative) Examples of Digital Signature and Verification A.1 General Requirements A.2 SM2 Elliptic Curve Digital Signature Annex B (Informative) Examples of Key Exchange and Verification B.1 General Requirements B.2 SM2 Elliptic Curve Key Exchange Protocol Annex C (Informative) Examples of Message Encryption and Decryption C.1 General Requirements C.2 SM2 Elliptic Curve Message Encryption and Decryption
Code of China
Standard
GM/T 0003.5-2012  Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 5: Parameter Definition (English Version)
Standard No.GM/T 0003.5-2012
Statusvalid
LanguageEnglish
File FormatPDF
Word Count7500 words
Price(USD)140.0
Implemented on2012-3-21
Deliveryvia email in 1 business day
Detail of GM/T 0003.5-2012
Standard No.
GM/T 0003.5-2012
English Name
Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 5: Parameter Definition
Chinese Name
SM2椭圆曲线公钥密码算法 第5部分:参数定义
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2012-03-21
Implemented on
2012-3-21
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
7500 words
Price(USD)
140.0
Keywords
GM/T 0003.5-2012, GM 0003.5-2012, GMT 0003.5-2012, GM/T0003.5-2012, GM/T 0003.5, GM/T0003.5, GM0003.5-2012, GM 0003.5, GM0003.5, GMT0003.5-2012, GMT 0003.5, GMT0003.5
Introduction of GM/T 0003.5-2012
1 Scope This part of GM/T 0003 specifies the curve parameters of the public key cryptographic algorithm SM2 based on elliptic curves, and gives the examples of digital signature and verification, key exchange and verification, and message encryption and decryption. 2 Parameter Definition SM2 uses the elliptic curve with a 256-bit prime field. Elliptic curve equation: y2=x2+ax+b Curve parameters: p=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 00000000 FFFFFFFF FFFFFFFF a=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 00000000 FFFFFFFF FFFFFFFC b=28E9FA9E 9D9F5E34 4D5A9E4B CF6509A7 F39789F5 15AB8F92 DDBCBD41 4D940E93 n=FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF 7203DF6B 21C6052B 53BBF409 39D54123 xG=32C4AE2C 1F198119 5F990446 6A39C994 8FE30BBF F2660BE1 715A4589 334C74C7 yG=BC3736A2 F4F6779C 59BDCEE3 6B692153 D0A9877C C62A4740 02DF32E5 2139F0A0
Contents of GM/T 0003.5-2012
Foreword i 1 Scope 2 Parameter Definition Annex A (Informative) Examples of Digital Signature and Verification A.1 General Requirements A.2 SM2 Elliptic Curve Digital Signature Annex B (Informative) Examples of Key Exchange and Verification B.1 General Requirements B.2 SM2 Elliptic Curve Key Exchange Protocol Annex C (Informative) Examples of Message Encryption and Decryption C.1 General Requirements C.2 SM2 Elliptic Curve Message Encryption and Decryption
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0003.5-2012, GM 0003.5-2012, GMT 0003.5-2012, GM/T0003.5-2012, GM/T 0003.5, GM/T0003.5, GM0003.5-2012, GM 0003.5, GM0003.5, GMT0003.5-2012, GMT 0003.5, GMT0003.5