## GB/T 32918.3-2016: Translated English of Chinese Standard. (GBT 32918.3-2016, GB/T32918.3-2016, GBT32918.3-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 3: Key exchange protocolThis Part of GB/T 32918 specifies the key exchange protocol of public key cryptographic algorithm SM2 based on elliptic curves, and gives examples of key exchange and verification and their corresponding processes. This Part is applicable to the key exchange in commercial cryptographic application. It can satisfy twice or optional three-times information transfer process of the communication parties; and calculate and obtain a shared secret key (session key) jointly determined by both parties. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Other editions - View all

### Common terms and phrases

A’s private key A’s public key algorithm SM2 based base point based on elliptic CALCULATE Shared key CALCULATE TAKE CALCULATE CALCULATE the elliptic Calculation option Option CONVERT the data Coordinate x2 Coordinate yA0 CALCULATE cryptographic algorithm SM2 cryptographic hash algorithm curve point Coordinate curve’s key exchange curve’s system parameters data type discrete logarithm problem distinguishing identifier E(Fq elliptic curve equation elliptic curve point Elliptic curve’s key Elliptic curve’s system exchange protocol process finite field GB/T Hash(XU key confirmation key cryptographic algorithm key data Key derivation function key exchange protocol klen methods given modn negotiation fails number rB CALCULATE option Option SB point at infinity point Coordinate xA0 Public key cryptographic random number rB relevant values type of x2 User A’s User B’s private User B’s public x1 into integer xB1 Coordinate yB1 xG Coordinate xU Coordinate yU yA1 CALCULATE Coordinate yU CALCULATE Shared yV CALCULATE ǁ yG ǁ