## GB/T 32918.5-2017: Translated English of Chinese Standard. (GBT 32918.5-2017, GB/T32918.5-2017, GBT32918.5-2017): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definitionThis Part of GB/T 32918 specifies the curve parameters of public key cryptographic algorithm SM2 based on elliptic curves. This Part applies to digital signature and verification (SEE Appendix A), key exchange and verification (SEE Appendix B), and example of message encryption and decryption (SEE Appendix C). |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Other editions - View all

### Common terms and phrases

algorithm SM2 based appendix selects Base point based on elliptic bits in length CALCULATE the elliptic Calculation option Option Coordinate xG Coordinate Coordinate yG Order cryptographic algorithm SM2 cryptographic hash algorithm curve point Coordinate curves Elliptic curve Digital signature algorithm discrete logarithm problem Elliptic curve equation elliptic curve point elliptic curves Elliptic encryption and decryption expressed in hexadecimal Factor a Factor finite field Fp-256 Prime number given in GB/T hash algorithm given Hash value hexadecimal form Information security technology key Coordinate xB key cryptographic algorithm key encryption algorithm Key exchange protocol left and low less than 264 message bit string message encryption number p Factor order is recorded Parameter definition Plaintext point Coordinate x2 point G Public key Coordinate Public key cryptographic Public key encryption random number recorded as H256 relevant values selects the cryptographic specified in GB/T User B’s value of 256 x2 Coordinate xG Coordinate yG y2=x3+ax+b Example