GB/T 32918.3-2016 Translated English of Chinese Standard. (GBT 32918.3-2016, GB/T32918.3-2016, GBT32918.3-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 3: Key exchange protocolhttps://www.chinesestandard.net, 14 sept. 2018 - 23 pages This Part of GB/T 32918 specifies the key exchange protocol of public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of key exchange and verification and their corresponding processes. This Part is applicable to the key exchange in commercial cryptographic application. It can satisfy twice or optional three-times information transfer process of the communication parties; and calculate and obtain a shared secret key (session key) jointly determined by both parties. |
Expressions et termes fréquents
A’s private key algorithm SM2 based B’s public key base point based on elliptic CALCULATE SA=Hash(0x03 CALCULATE Shared key CALCULATE TAKE CALCULATE CALCULATE the elliptic Calculation option Option CONVERT the data Coordinate xB0 Coordinate Coordinate xG Coordinate yV CALCULATE cryptographic algorithm SM2 cryptographic hash algorithm curve point Coordinate curve’s key exchange curve’s system parameters data type discrete logarithm problem distinguishing identifier elliptic curve equation elliptic curve point Elliptic curve’s key Elliptic curve’s system entlenB exchange protocol process finite field GB/T Hash(XU integer KB Calculation option key confirmation key cryptographic algorithm key dA User key data Key derivation function key exchange protocol key KA Calculation klen methods given modn negotiation fails number rA CALCULATE Option SB point at infinity point G Public key cryptographic random number relevant values User A’s private User A’s public xA1 Coordinate yA1 xV Coordinate yV yB1 CALCULATE Coordinate yV CALCULATE Shared ǁ yG ǁ