This part of GB/T 32918 specifies the curve parameters of the public key cryptographic algorithm SM2 based on elliptic curves.
This part is applied to the examples of digital signature and verification (See Annex A), key exchange and verification(See Annex B), and message encryption and decryption(See Annex C).
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 32905-2016 Information security technique - SM3 cryptographic hash algorithm
GB/T 32918.1-2016 Information security technology- Public key cryptographic algorithm SM2 based on elliptic curves- Part 1:General
GB/T 32918.2-2016 Information security technology-Public key cryptographic algorithm SM2 based on elliptic curves-Part 2:Digital signature algorithm
GB/T 32918.3-2016 Information security technology-Public key cryptographic algorithm SM2 based on elliptic curves-Part 3:Key exchange protocol
GB/T 32918.4-2016 Information security technology-Public key cryptographic algorithm SM2 based on elliptic curves- Part 4:Public key encryption algorithm
3 Symbols
For the purpose of this document, the following symbols apply.
p Prime number greater than 3
GB/T 32918.5-2017 The following standards are cited: