GB/T 32918.4-2016 Translated English of Chinese Standard. (GBT 32918.4-2016, GB/T32918.4-2016, GBT32918.4-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 4: Public key encryption algorithmhttps://www.chinesestandard.net, 14 sept. 2018 - 24 pages This Part of GB/T 32918 specifies public key encryption algorithm of public key cryptographic algorithm SM2 based on elliptic curves. It gives the message encryption and decryption examples as well as the corresponding process. This Part applies to message encryption and decryption in commercial password applications. The sender of the message can encrypt the message with the receiver public key. The receiver decrypts with the corresponding private key to obtain the message. |
Expressions et termes fréquents
algorithm SM2 based auxiliary functions base point based on elliptic bit length bit strings according C1 satisfies Calculate elliptic curve Calculate Step Calculate the elliptic ciphertext C=C1 Convert the data cryptographic algorithm SM2 cryptographic hash algorithm curve point Yes curve system parameters curve’s discrete logarithm data Elliptic curve’s data type discrete logarithm problem elliptic curve E(Fq elliptic curve parameters elliptic curve point Elliptic curve system elliptic curve’s discrete encryption algorithm based Encryption algorithm flow encryption and decryption error and exit following operation steps GB/T Information security techniques integer greater KDF x2 key cryptography key data key derivation function key encryption algorithm key exchange protocol length klen method given Output ciphertext Password hash algorithm plaintext point G public key cryptographies public key cryptosystem public key encryption random number raw data Elliptic report an error signature algorithm SM3 cryptographic hash Take the bit User B's Verify whether C1 y2 into bit Yes No Step