<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM 'rfc2629.dtd' []>
<rfc ipr="trust200902" category="std" docName="draft-openpgp-oscca-02" updates="4880, 6637">
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc private=""?>
<?rfc topblock="yes"?>
<?rfc comments="no"?>
<front>
<title abbrev="">OSCCA Extensions For OpenPGP</title>

<author initials="R. H." surname="Tse" fullname="Ronald Henry Tse">
<organization>Ribose</organization>
<address>
<postal>
<street>Suite 1111, 1 Pedder Street</street>
<city>Central</city>
<code></code>
<country>Hong Kong</country>
<region>Hong Kong</region>
</postal>
<phone></phone>
<email>ronald.tse@ribose.com</email>
<uri>https://www.ribose.com</uri>
</address>
</author>
<author initials="W. K." surname="Wong" fullname="Dr. Wai Kit Wong">
<organization>Hang Seng Management College</organization>
<address>
<postal>
<street>Hang Shin Link, Siu Lek Yuen</street>
<city>Shatin</city>
<code></code>
<country>Hong Kong</country>
<region>New Territories</region>
</postal>
<phone></phone>
<email>wongwk@hsmc.edu.hk</email>
<uri>https://www.hsmc.edu.hk</uri>
</address>
</author>
<author initials="J. E." surname="Lloyd" fullname="Jack E. Lloyd">
<organization>Ribose</organization>
<address>
<postal>
<street></street>
<city></city>
<code></code>
<country>United States of America</country>
<region></region>
</postal>
<phone></phone>
<email>jack@randombit.net</email>
<uri>https://www.ribose.com</uri>
</address>
</author>
<author initials="D. E." surname="Wyatt" fullname="Daniel Elliot Wyatt">
<organization>Ribose</organization>
<address>
<postal>
<street>608 W Cork St, Apt 2</street>
<city>Winchester</city>
<code></code>
<country>United States of America</country>
<region>VA</region>
</postal>
<phone></phone>
<email>daniel.wyatt@ribose.com</email>
<uri>https://www.ribose.com</uri>
</address>
</author>
<author initials="E." surname="Borsboom" fullname="Erick Borsboom">
<organization>Ribose</organization>
<address>
<postal>
<street>Suite 1111, 1 Pedder Street</street>
<city>Central</city>
<code></code>
<country>Hong Kong</country>
<region>Hong Kong</region>
</postal>
<phone></phone>
<email>erick.borsboom@ribose.com</email>
<uri>https://www.ribose.com</uri>
</address>
</author>
<date year="2017" month="September" day="14"/>

<area>Internet</area>
<workgroup>Network Working Group</workgroup>


<abstract>
<t>This document enables OpenPGP (RFC4880) usage in an compliant manner
with OSCCA regulations for use within China.
</t>
<t>Specifically, it extends OpenPGP to support the usage of SM2,
SM3 and SM4 algorithms, and provides the OSCCA-compliant OpenPGP
profile &quot;OSCCA-SM234&quot;.
</t>
</abstract>


</front>

<middle>

<section anchor="introduction" title="Introduction">
<t>SM2 <xref target="GBT.32918.1-2016"/> <xref target="ISO.IEC.14888-3"/> <xref target="GMT-0003-2012"/> <xref target="SM2"/> <xref target="I-D.shen-sm2-ecdsa"/>,
SM3 <xref target="GBT.32905-2016"/> <xref target="ISO.IEC.10118-3"/> <xref target="GMT-0004-2012"/> <xref target="SM3"/> <xref target="I-D.shen-sm3-hash"/> and
SM4 <xref target="GBT.32907-2016"/> <xref target="ISO.IEC.18033-3.AMD2"/> <xref target="GMT-0002-2012"/> <xref target="SM4"/> <xref target="I-D.ribose-cfrg-sm4"/>
are cryptographic standards issued by the Organization of State Commercial
Administration of China <xref target="OSCCA"/> as authorized cryptographic algorithms for use
within China. These algorithms are published in public.
</t>
<t>Adoption of this document enables exchange of OpenPGP-secured email <xref target="RFC4880"/>
in a OSCCA-compliant manner through usage of the authorized combination of
SM2, SM3 and SM4.
</t>
<t>SM2 is a set of public key cryptographic algorithms based on elliptic curves
that include:
</t>
<t>
<list style="symbols">
<t>Digital Signature Algorithm <xref target="GBT.32918.2-2016"/> <xref target="ISO.IEC.14888-3"/> <xref target="SM2-2"/></t>
<t>Key Exchange Protocol <xref target="GBT.32918.3-2016"/> <xref target="SM2-3"/></t>
<t>Public Key Encryption Algorithm <xref target="GBT.32918.4-2016"/> <xref target="SM2-4"/></t>
</list>
</t>
<t>SM3 <xref target="GBT.32905-2016"/> <xref target="ISO.IEC.10118-3"/> is a hash algorithm designed for
electronic authentication purposes.
</t>
<t>SM4 <xref target="GBT.32907-2016"/> <xref target="ISO.IEC.18033-3.AMD2"/> is a symmetric encryption
algorithm designed for data encryption.
</t>
<t>This document extends OpenPGP <xref target="RFC4880"/> and its ECC extension
<xref target="RFC6637"/> to support SM2, SM3 and SM4:
</t>
<t>
<list style="symbols">
<t>support the SM3 hash algorithm for data validation purposes</t>
<t>support signatures utilizing the combination of SM3 with other digital
signing algorithms, such as RSA, ECDSA and SM2</t>
<t>support the SM2 asymmetric encryption algorithm for public key
operations</t>
<t>support usage of SM2 in combination with supported hash algorithms, such as
SHA-256 and SM3</t>
<t>support the SM4 symmetric encryption algorithm for data protection purposes</t>
<t>defines the OpenPGP profile &quot;OSCCA-SM234&quot; to enable usage of OpenPGP
in an OSCCA-compliant manner.</t>
</list>
</t>
</section>

<section anchor="conventions-used-in-this-document" title="Conventions Used in This Document">
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;,
&quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;,
&quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted
as described in <xref target="RFC2119"/>.
</t>
<t>Compliant applications are a subset of the broader set of OpenPGP
applications described in <xref target="RFC4880"/>. Any <xref target="RFC2119"/> keyword within
this document applies to compliant applications only.
</t>

<section anchor="definitions" title="Definitions">
<t>
<list style="hanging">
<t hangText="OSCCA-compliant">
<vspace />
All cryptographic algorithms used are compliant with OSCCA <xref target="OSCCA"/> regulations.</t>
<t hangText="SM2DSA">
<vspace />
The elliptic curve digital signature algorithm defined in <xref target="GBT.32918.2-2016"/></t>
<t hangText="SM2KEP">
<vspace />
The elliptic curve key exchange protocol defined in <xref target="GBT.32918.3-2016"/></t>
<t hangText="SM2PKE">
<vspace />
The public key encryption algorithm defined in <xref target="GBT.32918.4-2016"/></t>
</list>
</t>
</section>

<section anchor="basic-operations" title="Basic Operations">
<t>This document utilizes definitions of operations from <xref target="RFC7253"/> and
are included here for reference.
</t>
<t>
<list style="hanging">
<t hangText="c^i">
<vspace />
The integer c raised to the i-th power.</t>
<t hangText="S || T">
<vspace />
String S concatenated with string T (e.g., 000 || 111 == 000111).</t>
</list>
</t>
</section>
</section>

<section anchor="sm2-algorithm" title="SM2 ECC Algorithms">
<t>SM2 is an elliptic curve based cryptosystem (ECC) <xref target="GBT.32918.1-2016"/>
<xref target="GMT-0003-2012"/> <xref target="SM2"/> <xref target="I-D.shen-sm2-ecdsa"/> designed by Xiaoyun Wang
et al. and published by <xref target="OSCCA"/>.
</t>
<t>It was first published by the OSCCA in public in 2010 <xref target="SM2"/>, then
standardized as <xref target="GMT-0003-2012"/> in 2012, included in <xref target="ISO.IEC.11889"/> in 2015,
published as a Chinese National Standard as <xref target="GBT.32918.1-2016"/>,
and published in <xref target="ISO.IEC.14888-3"/> in 2017.
</t>
<t>The SM2 cryptosystem is composed of three distinct algorithms:
</t>
<t>
<list style="symbols">
<t>an elliptical curve digital signature algorithm (&quot;SM2DSA&quot;)
<xref target="GBT.32918.2-2016"/>, <xref target="ISO.IEC.14888-3"/>, <xref target="SM2-2"/>, also described in
<xref target="I-D.shen-sm2-ecdsa"/>;</t>
<t>a key exchange protocol (&quot;SM2KEP&quot;) <xref target="GBT.32918.3-2016"/> <xref target="SM2-3"/>; and</t>
<t>a public key encryption algorithm (&quot;SM2PKE&quot;) <xref target="GBT.32918.4-2016"/> <xref target="SM2-4"/>.</t>
</list>
</t>
<t>This document will refer to all three algorithms for the usage of
OpenPGP <xref target="RFC4880"/>.
</t>

<section anchor="sm2-digital-signature-algorithm" title="SM2 Digital Signature Algorithm">
<t>The SM2 Digital Signature Algorithm is intended for digital signature
and verifications in commercial cryptographic applications, including,
but not limited to:
</t>
<t>
<list style="symbols">
<t>identity authentication</t>
<t>protection of data integrity</t>
<t>verification of data authenticity</t>
</list>
</t>
<t>The process of digital signature signing and verification along with their
examples are found in <xref target="GBT.32918.2-2016"/>, <xref target="ISO.IEC.14888-3"/>, <xref target="SM2-2"/>,
and also described in <xref target="I-D.shen-sm2-ecdsa"/>.
</t>
<t>The SM2DSA process requires usage of a hash function within. For
OSCCA-compliant usage, a OSCCA-compliant hash function such as
SM3 <xref target="GBT.32905-2016"/> MUST also be used.
</t>
<t>Formal security proofs for SM2 are provided in <xref target="SM2-SigSecurity"/> indicating
that it satisfies both EUF-CMA security and security against generalized
strong key substitution attacks.
</t>
<t>The SM2DSA algorithm has been cryptanalyzed by multiple parties with the
current strongest attack being nonce <xref target="SM2-DSA-Nonces"/> <xref target="SM2-DSA-Nonces2"/>
and lattice attacks <xref target="SM2-DSA-Lattice"/>.
</t>
<t>In terms of OpenPGP usage, SM2DSA is an alternative to the ECDSA algorithm
specified in <xref target="RFC6637"/>.
</t>
<t>For OpenPGP compatibility, these additional requirements MUST be adhered
to:
</t>
<t>
<list style="symbols">
<t>SM2DSA allows use of an optional &quot;user identity&quot; string which is
hashed into <spanx style="verb">ZA</spanx> (Section 3.5 of <xref target="SM2-2"/> and Section 5.1.4.4 of
<xref target="I-D.shen-sm2-ecdsa"/>). In OpenPGP, the user identifier <spanx style="verb">IDA</spanx>
MUST be the empty string.</t>
<t>While SM2DSA usually signs <spanx style="verb">H(ZA || msg)</spanx> (Section 4.1 <xref target="SM2-2"/>),
but in OpenPGP, following the convention of <xref target="RFC6637"/>, we do not directly
sign the raw message <spanx style="verb">msg</spanx>, but its hash <spanx style="verb">H(msg)</spanx>. Therefore when
a message is signed by SM2DSA in OpenPGP, the algorithm MUST sign
the content of <spanx style="verb">H(ZA || H(msg))</spanx> instead of <spanx style="verb">H(ZA || msg)</spanx>.
Both hash algorithms used here MUST be identical.</t>
</list>
</t>
</section>

<section anchor="sm2-key-exchange-protocol" title="SM2 Key Exchange Protocol">
<t>The SM2 Key Exchange Protocol is used for cryptographic key exchange,
allowing the negotiation and exchange of a session key within two to
three message transfers.
</t>
<t>The process of key exchange and verification along with their examples
are found in <xref target="GBT.32918.3-2016"/> <xref target="SM2-3"/>, and also described in
<xref target="I-D.shen-sm2-ecdsa"/>.
</t>
<t>SM2KEP is not used with OpenPGP as it is a two- to three- pass key
exchange mechanism, while in OpenPGP, public keys of recipients are
available initially.
</t>
<t>The SM2KEP is now considered insecure due to <xref target="SM2-KEP-Comments"/>, similar
in status to the Unified Model and MQV schemes described in
<xref target="NIST.SP.800-56Ar2"/>.
</t>
</section>

<section anchor="sm2-public-key-encryption" title="SM2 Public Key Encryption">
<t>The SM2 Public Key Encryption algorithm is an elliptic curve
(ECC) based asymmetric encryption algorithm. It is used for
cryptographic encryption and decryption, allowing the message sender to
utilize the public key of the message receiver to encrypt the message,
with the recipient decrypting the messaging using his private key.
</t>
<t>The full description of SM2PKE is provided in <xref target="GBT.32918.4-2016"/>.
</t>
<t>It utilizes a public key size of 512 bits and private key size of 256
bits <xref target="GBT.32918.4-2016"/> <xref target="GMT-0003-2012"/>.
</t>
<t>The process of encryption and decryption, along with their examples are
found in <xref target="GBT.32918.4-2016"/> and <xref target="SM2-4"/>.
</t>
<t>The SM2PKE process requires usage of a hash function within. For
OSCCA-compliant usage, a OSCCA-compliant hash function such as
SM3 <xref target="GBT.32905-2016"/> MUST also be used.
</t>
<t>In OpenPGP, SM2PKE is an alternative to RSA specified in <xref target="RFC4880"/>.
</t>
</section>

<section anchor="recommended-sm2-curve" title="Recommended SM2 Curve">
<t>The recommended curve is specified in <xref target="GBT.32918.5-2017"/> <xref target="SM2-5"/>
and provided here for reference. SM2 uses a 256-bit elliptic curve.
</t>

<section anchor="definitions-1" title="Definitions">
<t>
<list style="hanging">
<t hangText="p">
<vspace />
an integer larger than 3</t>
<t hangText="a, b">
<vspace />
elements of F_q, defines an elliptic curve E on F_q</t>
<t hangText="n">
<vspace />
Order of base point G (n is a prime factor of E(F_q))</t>
<t hangText="x_G">
<vspace />
x-coordinate of generator G</t>
<t hangText="y_G">
<vspace />
y-coordinate of generator G</t>
</list>
</t>
</section>

<section anchor="elliptic-curve-formula" title="Elliptic Curve Formula">
<t>
y^2 = x^3 + ax + b

</t>
</section>

<section anchor="curve-parameters" title="Curve Parameters">

<figure align="center"><artwork align="center">
p   = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
      FFFFFFFF 00000000 FFFFFFFF FFFFFFFF
a   = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
      FFFFFFFF 00000000 FFFFFFFF FFFFFFFC
b   = 28E9FA9E 9D9F5E34 4D5A9E4B CF6509A7
      F39789F5 15AB8F92 DDBCBD41 4D940E93
n   = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
      7203DF6B 21C6052B 53BBF409 39D54123
x_G = 32C4AE2C 1F198119 5F990446 6A39C994
      8FE30BBF F2660BE1 715A4589 334C74C7
y_G = BC3736A2 F4F6779C 59BDCEE3 6B692153
      D0A9877C C62A4740 02DF32E5 2139F0A0
</artwork></figure>
</section>
</section>
</section>

<section anchor="sm3-algorithm" title="SM3 Hash Algorithm">
<t>The SM3 Cryptographic Hash Algorithm <xref target="GBT.32905-2016"/> is an iterative hash
function designed by Xiaoyun Wang et al., published by <xref target="OSCCA"/> as an
alternative to SHA-2 <xref target="NIST.FIPS.180-4"/>.
</t>
<t>It was first published by the OSCCA in public in 2010 <xref target="SM3"/>, then published
in the OSCCA standard <xref target="GMT-0004-2012"/> in 2012, published as a Chinese National
Standard as <xref target="GBT.32905-2016"/> in 2016, and included in the <xref target="ISO.IEC.10118-3"/>
standard in 2017.
</t>
<t>The algorithm is designed to be used for commercial cryptographic applications
including, but not limited to:
</t>
<t>
<list style="symbols">
<t>digital signatures and their verification</t>
<t>message authentication code generation and their verification</t>
<t>generation of random numbers</t>
</list>
</t>
<t>SM3 has a Merkle-Damgard construction and is similar to SHA-2
<xref target="NIST.FIPS.180-4"/> of the MD4 <xref target="RFC6150"/> family, with the addition of several
strengthening features including a more complex step function and stronger
message dependency than SHA-256 <xref target="SM3-Boomerang"/>.
</t>
<t>SM3 produces an output hash value of 256 bits long, based on 512-bit
input message blocks <xref target="SM3-Boomerang"/>, on input lengths up to 2^(m).
</t>
<t>The specification of SM3 is described in <xref target="GBT.32905-2016"/>, <xref target="SM3"/> and
<xref target="I-D.shen-sm3-hash"/>.
</t>
</section>

<section anchor="sm4-algorithm" title="SM4 Symmetric Encryption Algorithm">
<t>SM4 <xref target="GBT.32907-2016"/> <xref target="I-D.ribose-cfrg-sm4"/> <xref target="ISO.IEC.18033-3.AMD2"/>
<xref target="GMT-0002-2012"/> <xref target="SM4"/> is a symmetric encryption algorithm designed by
Shuwang Lu et al. originally intended for the usage of wireless local area
network (Wireless LAN) products.
</t>
<t>SM4 is a 128-bit blockcipher, uses a key size of 128 bits and
internally uses an 8-bit S-box. It performs 32 rounds per block.
Decryption is achieved by reversing the order of encryption.
</t>
<t>SMS4 was first published in public as part of WAPI (Wired Authentication
and Privacy Infrastructure), the Chinese National Standard for Wireless LAN
<xref target="GB.15629.11-2003"/>. It was then published independently by the OSCCA in 2006
<xref target="SM4"/>, formally renamed to SM4 in 2012 <xref target="GMT-0002-2012"/>,
published as a Chinese National Standard in 2016 <xref target="GBT.32907-2016"/>, and
included in <xref target="ISO.IEC.18033-3.AMD2"/> in 2017.
</t>
<t>It is a required encryption algorithm specified in WAPI <xref target="GB.15629.11-2003"/>.
</t>
</section>

<section anchor="supported-algorithms" title="Supported Algorithms">

<section anchor="public-key-algorithms" title="Public Key Algorithms">
<t>The SM2 algorithm is supported with the following extension.
</t>
<t>The following public key algorithm IDs are added to expand Section
9.1 of <xref target="RFC4880"/>, &quot;Public-Key Algorithms&quot;:
</t>
<texttable>
<ttcol align="left">ID</ttcol>
<ttcol align="left">Description of Algorithm</ttcol>

<c>TBD</c><c>SM2</c>
</texttable>
<t>Compliant applications MUST support both usages of SM2 <xref target="sm2-algorithm"/>:
</t>
<t>
<list style="symbols">
<t>SM2 Digital Signature Algorithm (SM2DSA) <xref target="GBT.32918.2-2016"/></t>
<t>SM2 Public Key Encryption (SM2PKE) <xref target="GBT.32918.4-2016"/></t>
</list>
</t>
</section>

<section anchor="symmetric-key-algorithms" title="Symmetric Key Algorithms">
<t>The SM4 algorithm is supported with the following extension.
</t>
<t>The following symmetric encryption algorithm ID is added to expand
Section 9.2 of <xref target="RFC4880"/>, &quot;Symmetric-Key Algorithms&quot;:
</t>
<texttable>
<ttcol align="left">ID</ttcol>
<ttcol align="left">Description of Algorithm</ttcol>

<c>TBD</c><c>SM4</c>
</texttable>
<t>Compliant applications MUST support SM4 <xref target="sm4-algorithm"/>.
</t>
</section>

<section anchor="hash-algorithms" title="Hash Algorithms">
<t>The SM3 algorithm is supported with the following extension.
</t>
<t>The following symmetric encryption algorithm IDs are added to expand
Section 9.3 of <xref target="RFC4880"/>, &quot;Hash Algorithms&quot;:
</t>
<texttable>
<ttcol align="left">ID</ttcol>
<ttcol align="left">Description of Algorithm</ttcol>

<c>TBD</c><c>SM3</c>
</texttable>
<t>Compliant applications MUST support SM3 <xref target="sm3-algorithm"/>.
</t>
</section>
</section>

<section anchor="conversion-primitives" title="Conversion Primitives">
<t>The encoding method of <xref target="RFC6637"/> Section 6 MUST be used, and is
compatible with the definition given in <xref target="SEC1"/>.
</t>
<t>For clarity, according to the EC curve MPI encoding method of <xref target="RFC6637"/>,
the exact size of the MPI payload for the &quot;SM2 Recommended&quot; 256-bit curve
<xref target="GBT.32918.5-2017"/>, is 515 bits.
</t>
</section>

<section anchor="sm2-kdf" title="SM2 Key Derivation Function">
<t>A key derivation function (KDF) is necessary to implement EC encryption.
</t>
<t>The SM2PKE KDF is defined in Section 3.4.3 of <xref target="GBT.32918.4-2016"/> (and
Section 5.4.3 of <xref target="I-D.shen-sm2-ecdsa"/>, Section 3.4.3 of <xref target="SM2-4"/>).
</t>
<t>For OSCCA-compliance, it SHOULD be used in conjunction with an
OSCCA-approved hash algorithm, such as SM3 <xref target="GBT.32905-2016"/>.
</t>
<t>The SM2PKE KDF is equivalent to the KDF2 function defined in
Section 13.2 of <xref target="IEEE.1363a.2004"/> given the following assignments:
</t>
<t>
<list style="symbols">
<t>Parameter
<list style="symbols">
<t>v as hBits, the output length of the selected hash function Hash</t>
</list></t>
<t>Input
<list style="symbols">
<t>KEYLEN as oBits</t>
<t>Z as the plaintext string; and</t>
<t>PB is set to the empty bit string.</t>
</list></t>
</list>
</t>
<t>Pseudocode of the SM2KDF function is provided here for convenience. This
function contains edited variable names for clarity.
</t>

<section anchor="prerequisites" title="Prerequisites">
<t>
<list style="symbols">
<t>Hash(S) is a hash function that outputs a v-bit long hash value
based on input S.</t>
<t>MSB(b, S) is a function that outputs the b most significant bits of
the bitstream S.</t>
<t>Floor(r) and Ceil(r) are the floor and ceiling functions
respectively for the input of real number r. Both functions
outputs an integer.</t>
</list>
</t>
</section>

<section anchor="inputs" title="Inputs">
<t>
<list style="hanging">
<t hangText="KEYLEN">
<vspace />
Desired key length. A positive integer less than (2^32 - 1) x v.</t>
<t hangText="Z">
<vspace />
Plaintext. String of any length.</t>
</list>
</t>
</section>

<section anchor="outputs" title="Outputs">
<t>
<list style="hanging">
<t hangText="K">
<vspace />
Generated key. String of length KEYLEN.</t>
</list>
</t>
<t>K is defined as follows.
</t>

<figure align="center"><artwork align="center">
  Counter = 1                  // a 32-bit counter
  n = KEYLEN / v

  for each 1 &lt;= i &lt;= Ceil(n)
    Ha_i = Hash( Z || Counter )
    Counter = Counter + 1
  end for

  if n is a whole number then
    Ha! = Ha_{Ceil(n)}
  else
    Ha! = MSB(KEYLEN − (v x Floor(n)), Ha_{Ceil(n)})
  end if

  K = Ha_1 || Ha_2 || ... || Ha_{Ceil(n)−1} || Ha!
</artwork></figure>
</section>
</section>

<section anchor="encoding-of-public-and-private-keys" title="Encoding of Public and Private Keys">

<section anchor="publickey-packet-formats" title="Public-Key Packet Formats">
<t>The following algorithm-specific packets are added to Section 5.5.2
of <xref target="RFC4880"/>, &quot;Public-Key Packet Formats&quot;, to support SM2DSA and
SM2PKE.
</t>
<t>This document extends the algorithm-specific portion with the following
fields.
</t>
<t>Algorithm-Specific Fields for SM2DSA keys:
</t>
<t>
<list style="symbols">
<t>a variable-length field containing a curve OID, formatted
as follows:
<list style="symbols">
<t>a one-octet size of the following field; values 0 and
0xFF are reserved for future extensions</t>
<t>octets representing a curve OID, described in <xref target="sm2-curve"/></t>
</list></t>
<t>MPI of an EC point representing a public key</t>
</list>
</t>
<t>Algorithm-Specific Fields for SM2PKE keys:
</t>
<t>
<list style="symbols">
<t>a variable-length field containing a curve OID, formatted
as follows:
<list style="symbols">
<t>a one-octet size of the following field; values 0 and
0xFF are reserved for future extensions</t>
<t>octets representing a curve OID, described in <xref target="sm2-curve"/></t>
</list></t>
<t>MPI of an EC point representing a public key</t>
</list>
</t>
<t>Note that both SM2DSA and SM2PKE public keys are composed of the same
sequence of fields, and use the same codepoint to identify them.
They are distinguished by the key usage flags.
</t>
</section>

<section anchor="secretkey-packet-formats" title="Secret-Key Packet Formats">
<t>The following algorithm-specific packets are added to Section 5.5.3.
of <xref target="RFC4880"/>, &quot;Secret-Key Packet Formats&quot;, to support SM2DSA and
SM2PKE.
</t>
<t>This document extends the algorithm-specific portion with the following
fields.
</t>
<t>Algorithm-Specific Fields for SM2DSA or SM2PKE secret keys:
</t>
<t>
<list style="symbols">
<t>an MPI of an integer representing the secret key, which is a
scalar of the public EC point</t>
</list>
</t>
</section>
</section>

<section anchor="message-encoding-with-public-keys" title="Message Encoding with Public Keys">

<section anchor="publickey-encrypted-session-key-packets-tag-1" title="Public-Key Encrypted Session Key Packets (Tag 1)">
<t>Section 5.1 of [RFC4880], &quot;Public-Key Encrypted Session Key Packets
(Tag 1)&quot; is extended to support SM2PKE using the following
algorithm specific fields for SM2PKE, through applying the KDF described
in <xref target="sm2-kdf"/>.
</t>
<t>Algorithm Specific Fields for SM2 encryption:
</t>
<t>
<list style="symbols">
<t>The SM2 ciphertext is formatted in the OpenPGP bitstream as a single MPI.
This consists of:
<list style="symbols">
<t><spanx style="verb">C = (C1 || C3 || C2)</spanx> (step A8 of Section 4.1 <xref target="SM2-4"/>), followed by</t>
<t>a single octet giving the code for the hash algorithm used within the
calculation of the KDF mask <spanx style="verb">t</spanx> (step A5 of Section 4.1 <xref target="SM2-4"/>) and the
calculation of <spanx style="verb">C3</spanx> (step A7 of Section 4.1 <xref target="SM2-4"/>).
For OSCCA compliance, this MUST be an OSCCA-approved hash function, and
in any case, it SHOULD be a hash which is listed in the receiving keys
&quot;Preferred Hash Algorithms&quot; list (Section 5.2.3.8 of <xref target="RFC4880"/>).</t>
</list></t>
</list>
</t>
</section>

<section anchor="signature-packet-tag-2" title="Signature Packet (Tag 2)">

<section anchor="version-3-signature-packet-format" title="Version 3 Signature Packet Format">
<t>Section 5.2.2 of <xref target="RFC4880"/> defines the signature format for &quot;Version 3 Signature Packet Format&quot;.
Similar to ECDSA <xref target="RFC6637"/>, no change in the format is necessary for SM2DSA.
</t>
</section>

<section anchor="version-4-signature-packet-format" title="Version 4 Signature Packet Format">
<t>Section 5.2.3 of <xref target="RFC4880"/> defines the signature format for &quot;Version 4 Signature Packet Format&quot;.
Similar to ECDSA <xref target="RFC6637"/>, no change in the format is necessary for SM2DSA.
</t>
</section>
</section>
</section>

<section anchor="sm2-curve" title="SM2 ECC Curve OID">
<t>This section provides the curve OID of the &quot;SM2 Recommended Curve&quot;
<xref target="GBT.32918.5-2017"/> described in <xref target="sm2-algorithm"/>, according to the method of
<xref target="RFC6637"/>.
</t>
<t>We specify the curve OID of the &quot;SM2 Recommended Curve&quot; to be the registered
OID entry of &quot;SM2 Elliptic Curve Cryptography&quot; according to <xref target="GMT-0006-2012"/>,
which is &quot;1.2.156.10197.1.301&quot;.
</t>
<t>The table below specifies the exact sequence of bytes of the mentioned curve:
</t>
<texttable>
<ttcol align="left">ASN.1 Object Identifier</ttcol>
<ttcol align="left">OID len</ttcol>
<ttcol align="left">Curve OID bytes in hexadecimal representation</ttcol>
<ttcol align="left">Curve name</ttcol>

<c>1.2.156.10197.1.301</c><c>8</c><c>2A 81 1C CF 55 01 82 2D</c><c>SM2 Recommended</c>
</texttable>
<t>The complete ASN.1 DER encoding for the SM2 Recommended curve
OID is &quot;06 08 2A 81 1C CF 55 01 82 2D&quot;, from which the first entry in
the table above is constructed by omitting the first two octets. Only
the truncated sequence of octets is the valid representation of a curve
OID.
</t>
</section>

<section anchor="compatibility-profiles" title="Compatibility Profiles">

<section anchor="oscca-sm234-profile" title="OSCCA SM234 Profile">
<t>The &quot;OSCCA SM234&quot; profile is designed to be compliant to OSCCA regulations.
A compliant OpenPGP implementation MUST implement the following
items as described by this document:
</t>
<t>
<list style="symbols">
<t>SM2 Recommended Curve (<xref target="sm2-curve"/>)</t>
<t>SM2 (SM2DSA and SM2PKE) (<xref target="sm2-algorithm"/>)
<list style="symbols">
<t>The hash function selected in SM2DSA and SM2PKE MUST also be
OSCCA-compliant, such as SM3 <xref target="SM3"/></t>
</list></t>
<t>SM3 (<xref target="sm3-algorithm"/>)</t>
<t>SM4 (<xref target="sm4-algorithm"/>)</t>
</list>
</t>
</section>
</section>

<section anchor="security-considerations" title="Security Considerations">
<t>
<list style="symbols">
<t>Products and services that utilize cryptography are regulated by the OSCCA <xref target="OSCCA"/>;
they must be explicitly approved or certified by the OSCCA before being allowed to
be sold or used in China.</t>
<t>SM2 <xref target="GBT.32918.1-2016"/> is an elliptic curve cryptosystem (ECC) published by the OSCCA <xref target="OSCCA"/>.
Its security relies on the assumption that the elliptic curve discrete
logarithm problem (ECLP) is computationally infeasible. With advances in
cryptanalysis, new attack algorithms may reduce the complexity of ECLP, making
it easier to attack the SM2 cryptosystem that is considered secure at the time
this document is published. You SHOULD check current literature to
determine if the algorithms in SM2 have been found vulnerable.</t>
<t>SM3 <xref target="GBT.32905-2016"/> is a cryptographic hash algorithm published by the OSCCA <xref target="OSCCA"/>.
No formal proof of security is provided. As claimed in <xref target="I-D.shen-sm3-hash"/>,
the security properties of SM3 are under public study. There are no known
feasible attacks against the SM3 algorithm at the time this document is
published.</t>
<t>SM4 <xref target="GBT.32907-2016"/> is a blockcipher certified by the OSCCA <xref target="OSCCA"/>.
No formal proof of security is provided. There are no known feasible
attacks against the SM4 algorithm by the time of publishing this document.
On the other hand, there are security concerns with regards to
side-channel attacks, when the SM4 algorithm is implemented in a
device <xref target="SM4-Power"/>. For instance, <xref target="SM4-Power"/> illustrated an attack
by measuring the power consumption of the device. A chosen ciphertext
attack, assuming a fixed correlation between the sub-keys and data
mask, is able to recover the round key successfully. When the SM4
algorithm is implemented in hardware, the parameters/keys SHOULD
be randomly generated without fixed correlation.</t>
<t>SM2 has a key length of 512 bits for the public key and 256 bits for the private key.
It is considered an alternative to ECDSA P-256 <xref target="RFC6637"/>. Its security strength
is comparable to a 128-bit symmetric key strength <xref target="I-D.ietf-msec-mikey-ecc"/>,
e.g., AES-128 <xref target="NIST.FIPS.197"/>.</t>
<t>SM3 is a hash function that generates a 256-bit hash value. It is considered
as an alternative to SHA-256 <xref target="RFC6234"/>.</t>
<t>SM4 is a blockcipher symmetric algorithm with a key length of 128 bits. It is
considered as an alternative to AES-128 <xref target="NIST.FIPS.197"/>.</t>
<t>Security considerations offered in <xref target="RFC6637"/> and <xref target="RFC4880"/> also apply.</t>
</list>
</t>
</section>

<section anchor="iana-considerations" title="IANA Considerations">
<t>The IANA &quot;Pretty Good Privacy (PGP)&quot; registry <xref target="RFC8126"/> has made the following
assignments for algorithms described in this document, namely:
</t>
<t>
<list style="symbols">
<t>ID XXX of the &quot;Public Key Algorithms&quot; namespace for SM2 <xref target="sm2-algorithm"/></t>
<t>ID XXX of the &quot;Hash Algorithms&quot; namespace for SM3 <xref target="sm3-algorithm"/></t>
<t>ID XXX of the &quot;Symmetric Key Algorithms&quot; namespace for SM4 <xref target="sm4-algorithm"/></t>
</list>
</t>
</section>

<section anchor="examples" title="Examples">

<section anchor="public-key-example" title="Public Key Example">

<figure align="center"><artwork align="center">
-----BEGIN PGP PUBLIC KEY BLOCK-----
xlIEWbGKWmMIKoEcz1UBgi0CAwQx5lUJNwGp01AB7YfAye0oMmyIPYe/cQPVwh8/7RCu
ywZLMDDAM7qn6TNqTtdKW+7tLFhtOC4yzDVK8UjN/ccazSBTTTIgMjU2LWJpdCBrZXkg
PGphY2tAbG9jYWxob3N0PsJ0BBNjaQAmBQJZsYpfAhsDBQsJCAcCBhUICQoLAgUWAgMB
AAkQC/UcNw0bAZcAAJt5AP4oXvi3xl2RUwAvVjlzXtLL87g6x9cIBS7EB/cvAsw78AEA
/Wt6qWlBVZ6TYiqNPt9An/4cjKyNpAv7S9u3neGXWUU=
=RJ3C
-----END PGP PUBLIC KEY BLOCK-----
</artwork></figure>
</section>

<section anchor="signature-example" title="Signature Example">
<t>Detached signature of the string &quot;SM2 example&quot; using the above key:
</t>

<figure align="center"><artwork align="center">
-----BEGIN PGP SIGNATURE-----
wmQEAGMIABYFAlmxj+cFAwAAAAAJEAv1HDcNGwGXAAB+SQEAy5AHKgiRxgOogB/2sfge
JaVoLgpxvDp9yIcaLfP++xkBAPGuZ1f9FjxVd5jlCGd1jFzAPpt8N2Lc3FQDqVjgJvV9
=Xbbj
-----END PGP SIGNATURE-----
</artwork></figure>
</section>
</section>

</middle>
<back>
<references title="Normative References">
<reference anchor='GBT.32905-2016' target='http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=45B1A67F20F3BF339211C391E9278F5E'>
  <front>
    <title>GB/T 32905-2016 Information Security Techniques -- SM3 Cryptographic Hash Algorithm</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32907-2016' target='http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=7803DE42D3BC5E80B0C3E5D8E873D56A'>
  <front>
    <title>GB/T 32907-2016 Information Security Technology -- SM4 Block Cipher Algorithm</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32918.1-2016' target='http://www.sac.gov.cn/was5/web/search?channelid=97779&amp;templet=gjcxjg_detail.jsp&amp;searchword=STANDARD_CODE=%27GB/T%2032918.1-2016%27'>
  <front>
    <title>GB/T 32918.1-2016 Information Security Technology -- Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves -- Part 1: General</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32918.2-2016' target='http://www.sac.gov.cn/was5/web/search?channelid=97779&amp;templet=gjcxjg_detail.jsp&amp;searchword=STANDARD_CODE=%27GB/T%2032918.2-2016%27'>
  <front>
    <title>GB/T 32918.2-2016 Information Security Technology -- Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves -- Part 2: Digital Signature Algorithm</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32918.3-2016' target="http://www.sac.gov.cn/was5/web/search?channelid=97779&amp;templet=gjcxjg_detail.jsp&amp;searchword=STANDARD_CODE=%27GB/T%2032918.3-2016%27">
  <front>
    <title>GB/T 32918.3-2016 Information Security Technology -- Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves -- Part 3: Key Exchange</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32918.4-2016' target='http://www.sac.gov.cn/was5/web/search?channelid=97779&amp;templet=gjcxjg_detail.jsp&amp;searchword=STANDARD_CODE=%27GB/T%2032918.4-2016%27'>
  <front>
    <title>GB/T 32918.4-2016 Information Security Technology -- Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves -- Part 4: Public Key Encryption Algorithm</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='29' month='August' year='2016'/>
  </front>
</reference>
<reference anchor='GBT.32918.5-2017' target='http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=728DEA8B8BB32ACFB6EF4BF449BC3077'>
  <front>
    <title>GB/T 32918.5-2017 Information Security Technology -- Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves -- Part 5: Parameter Definition</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='12' month='May' year='2017'/>
  </front>
</reference>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4880.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6637.xml"?>
</references>
<references title="Informative References">
<reference anchor='GB.15629.11-2003' target='http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=74B9DD11287E72408C19C4D3A360D1BD'>
  <front>
    <title>Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author>
      <organization>Standardization Administration of the People's Republic of China</organization>
      <address>
        <postal>
         <street>No. 9 Madian Donglu, Haidian District</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100088</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 8226-2609</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.sac.gov.cn</uri>
      </address>
    </author>
    <date day='12' month='May' year='2003'/>
  </front>
</reference>
<reference anchor='GMT-0002-2012' target='http://www.oscca.gov.cn/Column/Column_32.htm'>
  <front>
    <title>GM/T 0002-2012: SM4 Block Cipher Algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date day='21' month='March' year='2012'/>
  </front>
</reference>
<reference anchor='GMT-0003-2012' target='http://www.oscca.gov.cn/Column/Column_32.htm'>
  <front>
    <title>GM/T 0003-2012: Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date day='21' month='March' year='2012'/>
  </front>
</reference>
<reference anchor='GMT-0004-2012' target='http://www.oscca.gov.cn/Column/Column_32.htm'>
  <front>
    <title>GM/T 0004-2012: SM3 Hash Algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date day='21' month='March' year='2012'/>
  </front>
</reference>
<reference anchor='GMT-0006-2012' target='http://www.oscca.gov.cn/Column/Column_32.htm'>
  <front>
    <title>GM/T 0006-2012: Cryptographic Application Identifier Criterion Specification</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date day='21' month='March' year='2012'/>
  </front>
</reference>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-msec-mikey-ecc.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ribose-cfrg-sm4.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.shen-sm2-ecdsa.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.shen-sm3-hash.xml"?>
<reference anchor='IEEE.1363a.2004' target='http://grouper.ieee.org/groups/1363/'>
  <front>
    <title>IEEE Std 1363a-2004: IEEE Standard Specifications for Public-Key Cryptography -- Amendment 1: Additional Techniques</title>
    <author fullname="Microprocessor and Microcomputer Standards Committee of the IEEE Computer Society">
      <organization>Institute of Electrical and Electronics Engineers</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>New York</city>
          <region>NY</region>
          <code>10016-5997</code>
          <country>United States</country>
        </postal>
        <uri>https://www.ieee.org/</uri>
      </address>
    </author>
    <date day='2' month='September' year='2004'/>
  </front>
</reference>
<reference anchor='ISO.IEC.10118-3' target='https://www.iso.org/standard/67116.html'>
  <front>
    <title>ISO/IEC FDIS 10118-3 -- Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions</title>
    <author>
      <organization>International Organization for Standardization</organization>
      <address>
        <postal>
          <street>BIBC II</street>
          <street>Chemin de Blandonnet 8</street>
          <street>CP 401</street>
          <city>Vernier</city>
          <region>Geneva</region>
          <code>1214</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 22 749 01 11</phone>
        <email>central@iso.org</email>
        <uri>https://www.iso.org/</uri>
      </address>
    </author>
    <date day='3' month='June' year='2017'/>
  </front>
</reference>
<reference anchor='ISO.IEC.11889' target='https://www.iso.org/standard/66510.html'>
  <front>
    <title>ISO/IEC 11889-1:2015 -- Information technology -- Trusted platform module library</title>
    <author>
      <organization>International Organization for Standardization</organization>
      <address>
        <postal>
          <street>BIBC II</street>
          <street>Chemin de Blandonnet 8</street>
          <street>CP 401</street>
          <city>Vernier</city>
          <region>Geneva</region>
          <code>1214</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 22 749 01 11</phone>
        <email>central@iso.org</email>
        <uri>https://www.iso.org/</uri>
      </address>
    </author>
    <date month='August' year='2015'/>
  </front>
</reference>
<reference anchor='ISO.IEC.14888-3' target='https://www.iso.org/standard/70631.html'>
  <front>
    <title>ISO/IEC 14888-3:2016-03 -- Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms</title>
    <author>
      <organization>International Organization for Standardization</organization>
      <address>
        <postal>
          <street>BIBC II</street>
          <street>Chemin de Blandonnet 8</street>
          <street>CP 401</street>
          <city>Vernier</city>
          <region>Geneva</region>
          <code>1214</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 22 749 01 11</phone>
        <email>central@iso.org</email>
        <uri>https://www.iso.org/</uri>
      </address>
    </author>
    <date day='04' month='September' year='2017'/>
  </front>
</reference>
<reference anchor='ISO.IEC.18033-3.AMD2' target='https://www.iso.org/standard/54531.html'>
  <front>
    <title>ISO/IEC WD1 18033-3/AMD2 -- Information technology -- Security techniques -- Encryption algorithms -- Part 3: Block ciphers -- Amendment 2</title>
    <author>
      <organization>International Organization for Standardization</organization>
      <address>
        <postal>
          <street>BIBC II</street>
          <street>Chemin de Blandonnet 8</street>
          <street>CP 401</street>
          <city>Vernier</city>
          <region>Geneva</region>
          <code>1214</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 22 749 01 11</phone>
        <email>central@iso.org</email>
        <uri>https://www.iso.org/</uri>
      </address>
    </author>
    <date day='13' month='June' year='2017'/>
  </front>
</reference>
<reference anchor='NIST.FIPS.180-4' target='http://dx.doi.org/10.6028/NIST.FIPS.180-4'>
  <front>
    <title>FIPS 180-4 Secure Hash Standard (SHS)</title>
    <author>
      <organization>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899-8900</code>
          <country>United States</country>
        </postal>
        <uri>http://www.nist.gov/</uri>
      </address>
    </author>
    <date month='August' year='2015'/>
  </front>
</reference>
<reference anchor='NIST.FIPS.197' target='https://doi.org/10.6028/NIST.FIPS.197'>
  <front>
    <title>FIPS 197 Advanced Encryption Standard (AES)</title>
    <author>
      <organization>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899-8900</code>
          <country>United States</country>
        </postal>
        <uri>http://www.nist.gov/</uri>
      </address>
    </author>
    <date month='November' year='2001'/>
  </front>
</reference>
<reference anchor='NIST.SP.800-56Ar2' target='http://dx.doi.org/10.6028/NIST.SP.800-56Ar2'>
  <front>
    <title>SP 800-56Ar2 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography</title>
    <author initials="B." surname="Barker" fullname="Elaine B. Barker">
      <organization>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>United States</country>
        </postal>
        <uri>http://www.nist.gov/</uri>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Lily Chen">
      <organization>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>United States</country>
        </postal>
        <uri>http://www.nist.gov/</uri>
      </address>
    </author>
    <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
      <organization>National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>United States</country>
        </postal>
        <uri>http://www.nist.gov/</uri>
      </address>
    </author>
    <author initials="M." surname="Smid" fullname="Miles Smid">
      <organization>Orion Security Solutions, Inc.</organization>
      <address>
        <postal>
          <street>1489 Chain Bridge Road</street>
          <street>Suite 300</street>
          <city>McLean</city>
          <region>VA</region>
          <code>22101</code>
          <country>United States</country>
        </postal>
        <uri>http://www.orionsecuritysolutions.com</uri>
      </address>
    </author>
    <date month='May' year='2013'/>
  </front>
</reference>
<reference anchor='OSCCA' target='http://www.oscca.gov.cn'>
  <front>
    <title>Organization of State Commercial Administration of China</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='May' year='2017'/>
  </front>
</reference>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6150.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6234.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7253.xml"?>
<?rfc include="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml"?>
<reference anchor='SEC1' target='http://www.secg.org/SEC1-Ver-1.0.pdf'>
  <front>
    <title>SEC 1: Elliptic Curve Cryptography</title>
    <author>
      <organization>Standards for Efficient Cryptography Group</organization>
    </author>
    <date month='September' year='2010'/>
  </front>
</reference>
<reference anchor='SM2' target='http://www.oscca.gov.cn/UpFile/2010122214822692.pdf'>
  <front>
    <title>Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM2-2' target='http://www.oscca.gov.cn/UpFile/2010122214822692.pdf'>
  <front>
    <title>Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves -- Part 2: Digital Signature Algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM2-3' target='http://www.oscca.gov.cn/UpFile/2010122214822692.pdf'>
  <front>
    <title>Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves -- Part 3: Key Exchange Protocol</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM2-4' target='http://www.oscca.gov.cn/UpFile/2010122214822692.pdf'>
<!-- <reference anchor='SM2-4' target='http://info.dacas.cn/sharedimages/ARTICLES/SMAlgorithms/SM2_4.pdf'> -->
  <front>
    <title>Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves -- Part 4: Public Key Encryption Algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>

    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM2-5' target='http://www.oscca.gov.cn/UpFile/2010122214836668.pdf'>
  <front>
    <!--<title>Public Key Cryptographic Algorithm SM2 Recommended Elliptic Curves Parameters</title>-->
    <title>Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves -- Part 5: Parameter definitions</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM2-DSA-Lattice' target='https://doi.org/10.1007/978-3-319-29814-6_6'>
  <front>
    <title>Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm</title>
<!--Information and Communications Security. ICICS 2015. Lecture Notes in Computer Science, vol 9543. Springer, Cham-->
    <author initials="W." surname="Cao" fullname="Weiqiong Cao">
      <organization>Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="J." surname="Feng" fullname="Jingyi Feng">
      <organization>Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="S." surname="Zhu" fullname="Shaofeng Zhu">
      <organization>Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="H." surname="Chen" fullname="Hua Chen">
      <organization>Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="W." surname="Wu" fullname="Wenling Wu">
      <organization>Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="X." surname="Han" fullname="Xucang Han">
      <organization>Beijing Key Laboratory of RFID Chip Test Technology, CEC Huada Electronic Design Co., Ltd</organization>
      <address>
        <postal>
          <street>Building C, CEC Network Security and Information Technology Base, South Region of Future Science And Technology Park, Beiqijia county, Changping District</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.hed.com.cn</uri>
      </address>
    </author>
    <author initials="X." surname="Zheng" fullname="Xiaoguang Zheng">
      <organization>Beijing Key Laboratory of RFID Chip Test Technology, CEC Huada Electronic Design Co., Ltd</organization>
      <address>
        <postal>
          <street>Building C, CEC Network Security and Information Technology Base, South Region of Future Science And Technology Park, Beiqijia county, Changping District</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.hed.com.cn</uri>
      </address>
    </author>
    <date month='November' year='2016'/>
  </front>
</reference>
<reference anchor='SM2-DSA-Nonces' target='https://dx.doi.org/10.1007/978-3-319-12087-4_22'>
  <front>
    <title>Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm</title>
<!--Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers-->
    <author initials="M." surname="Liu" fullname="Mingjie Liu">
      <organization>Beijing International Center for Mathematical Research, Peking University</organization>
      <address>
        <postal>
          <street>No. 5 Yiheyuan Road Haidian District</street>
          <city>Beijing</city>
          <code>100871</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.bicmr.org</uri>
      </address>
    </author>
    <author initials="J." surname="Chen" fullname="Jiazhe Chen">
      <organization>China Information Technology Security Evaluation Center</organization>
      <address>
        <postal>
          <street>Building 1, No.8, Shangdi West Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.itsec.gov.cn</uri>
      </address>
    </author>
    <author initials="H." surname="Li" fullname="Hexin Li">
      <organization>China Information Technology Security Evaluation Center</organization>
      <address>
        <postal>
          <street>Building 1, No.8, Shangdi West Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.itsec.gov.cn</uri>
      </address>
    </author>
    <date day='27' month='November' year='2013'/>
  </front>
</reference>
<reference anchor='SM2-DSA-Nonces2' target='https://doi.acm.org/10.1145/2714576.2714587'>
  <front>
    <title>Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm</title>
<!--Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15)-->
    <author initials="J." surname="Chen" fullname="Jiazhe Chen">
      <organization>China Information Technology Security Evaluation Center</organization>
      <address>
        <postal>
          <street>Building 1, No.8, Shangdi West Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>People's Republic of China</country>
        </postal>
        <email>jiazhechen@gmail.com</email>
        <uri>http://www.itsec.gov.cn</uri>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingjie Liu">
      <organization>Beijing Research Institute of Telemetry, China Aerospace Science and Technology Corporation</organization>
      <address>
        <postal>
          <street>1 Nan Da Hong Men Lu, Fengtai Qu</street>
          <city>Beijing</city>
          <code>100194</code>
          <country>People's Republic of China</country>
        </postal>
        <email>liumj9705@gmail.com</email>
        <uri>http://www.spacechina.com</uri>
      </address>
    </author>
    <author initials="H." surname="Shi" fullname="Hongsong Shi">
      <organization>China Information Technology Security Evaluation Center</organization>
      <address>
        <postal>
          <street>Building 1, No.8, Shangdi West Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://www.itsec.gov.cn</uri>
        <!--<email>unknown</email>-->
      </address>
    </author>
    <author initials="H." surname="Li" fullname="Hexin Li">
      <organization>China Information Technology Security Evaluation Center</organization>
      <address>
        <postal>
          <street>Building 1, No.8, Shangdi West Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>People's Republic of China</country>
        </postal>
        <email>lihx@secemail.cn</email>
        <uri>http://www.itsec.gov.cn</uri>
      </address>
    </author>
    <date day='27' month='November' year='2015'/>
  </front>
</reference>
<reference anchor='SM2-KEP-Comments' target='https://dx.doi.org/10.1007/978-3-642-25513-7_12'>
  <front>
    <title>Comments on the SM2 Key Exchange Protocol</title>
<!--bookTitle="Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings",-->
    <author initials="X." surname="Xu" fullname="Jing Xu">
      <organization>State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <email>xujing@is.iscas.ac.cn</email>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <author initials="D." surname="Feng" fullname="Dengguo Feng">
      <organization>State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <uri>http://english.is.cas.cn</uri>
      </address>
    </author>
    <date day='10' month='December' year='2011'/>
  </front>
</reference>
<reference anchor='SM2-SigSecurity' target='https://link.springer.com/chapter/10.1007/978-3-319-27152-1_7'>
  <front>
    <title>Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks</title>
<!-- International Conference on Research in Security Standardisation
Security Standardisation Research pp 140-153 -->
    <author initials="Z." surname="Zhang" fullname="Zhenfeng Zhang">
      <organization>Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <email>zfzhang@tca.iscas.ac.cn</email>
        <uri>http://tca.iscas.ac.cn</uri>
      </address>
    </author>
    <author initials="K." surname="Yang" fullname="Kang Yang">
      <organization>Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <email>yangkang@tca.iscas.ac.cn</email>
        <uri>http://tca.iscas.ac.cn</uri>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jiang Zhang">
      <organization>State Key Laboratory of Cryptology</organization>
      <address>
        <postal>
          <street>P.O. Box 5159</street>
          <city>Beijing</city>
          <code>100878</code>
          <country>People's Republic of China</country>
        </postal>
        <email>jiangzhang09@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Chen" fullname="Cheng Chen">
      <organization>Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <street>4# South Fourth Street, Zhong Guan Cun</street>
          <city>Beijing</city>
          <code>100190</code>
          <country>People's Republic of China</country>
        </postal>
        <email>chencheng@tca.iscas.ac.cn</email>
        <uri>http://tca.iscas.ac.cn</uri>
      </address>
    </author>
    <date day='9' month='December' year='2015'/>
  </front>
</reference>
<reference anchor='SM3' target='http://www.oscca.gov.cn/UpFile/20101222141857786.pdf'>
<!-- <reference anchor='SM3' target='http://info.dacas.cn/sharedimages/ARTICLES/SMAlgorithms/SM3.pdf'> -->
  <front>
    <title>SM3 Cryptographic Hash Algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM3-Boomerang' target='https://doi.org/10.1049/iet-ifs.2013.0380'>
  <front>
    <title>Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256</title>
      <!--IET Information Security ( Volume: 9, Issue: 3, 5 2015 )-->
    <author initials="D." surname="Bai" fullname="Dongxia Bai">
      <organization>Department of Computer Science and Technology, Tsinghua University</organization>
      <address>
        <postal>
          <street>Tsinghua University</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>People's Republic of China</country>
        </postal>
        <email>baidx10@mails.tsinghua.edu.cn</email>
        <uri>http://www.tsinghua.edu.cn</uri>
      </address>
    </author>
    <author initials="H." surname="Yu" fullname="Hongbo Yu">
      <address>
        <postal>
          <street>Tsinghua University</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>People's Republic of China</country>
        </postal>
        <email>yuhongbo@mail.tsinghua.edu.cn</email>
        <uri>http://www.tsinghua.edu.cn</uri>
      </address>
    </author>
    <author initials="G." surname="Wang" fullname="Gaoli Wang">
      <organization>School of Computer Science and Technology, Donghua University</organization>
      <address>
        <postal>
         <street>Donghua University</street>
         <city>Shanghai</city>
         <!--<region>CA</region>-->
         <code>201620</code>
         <country>People's Republic of China</country>
        </postal>
        <email>wanggaoli@dhu.edu.cn</email>
        <uri>https://www.dhu.edu.cn</uri>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoyun Wang">
      <organization>Institute for Advanced Study, Tsinghua University</organization>
      <address>
        <postal>
          <street>Tsinghua University</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>People's Republic of China</country>
        </postal>
        <email>xiaoyunwang@mail.tsinghua.edu.cn</email>
        <uri>http://www.tsinghua.edu.cn</uri>
      </address>
    </author>
    <date day='16' month='April' year='2015'/>
  </front>
</reference>
<reference anchor='SM4' target='http://www.oscca.gov.cn/UpFile/200621016423197990.pdf'>
<!-- <reference anchor='SM4' target='http://info.dacas.cn/sharedimages/ARTICLES/SMAlgorithms/SM4.pdf'> -->
  <front>
    <title>SM4 block cipher algorithm</title>
    <author>
      <organization>Organization of State Commercial Administration of China</organization>
      <address>
        <postal>
         <street>7 Dian Chang Lu, Fengtai Qu</street>
         <city>Beijing</city>
         <region>Beijing</region>
         <code>100036</code>
         <country>People's Republic of China</country>
        </postal>
        <phone>+86 (0)10 5970-3789</phone>
        <!--<email>contact@oscca.gov.cn</email>-->
        <uri>http://www.oscca.gov.cn</uri>
      </address>
    </author>
    <date month='December' year='2010'/>
  </front>
</reference>
<reference anchor='SM4-Power' target='http://dx.doi.org/10.6028/NIST.FIPS.180-4'>
  <front>
    <!-- Journal on Communications Vol. 36 No 10. -->
    <title>Improved chosen-plaintext power analysis attack against SM4 at the round-output</title>
    <author initials="Z." surname="Du" fullname="Zhi-bo Du">
      <organization>College of Information Security Engineering, Chengdu University of Information Technology</organization>
      <address>
        <postal>
          <street>No. 24 Block 1, Xuefu Road</street>
          <city>Chengdu</city>
          <region>MD</region>
          <code>610225</code>
          <country>China</country>
        </postal>
        <uri>http://www.cuit.edu.cn/</uri>
      </address>
    </author>
    <author initials="Z." surname="Wu" fullname="Zhen Wu">
      <organization>College of Information Security Engineering, Chengdu University of Information Technology</organization>
      <address>
        <postal>
          <street>No. 24 Block 1, Xuefu Road</street>
          <city>Chengdu</city>
          <region>MD</region>
          <code>610225</code>
          <country>China</country>
        </postal>
        <uri>http://www.cuit.edu.cn/</uri>
      </address>
    </author>
    <author initials="M." surname="Wang" fullname="Min Wang">
      <organization>College of Information Security Engineering, Chengdu University of Information Technology</organization>
      <address>
        <postal>
          <street>No. 24 Block 1, Xuefu Road</street>
          <city>Chengdu</city>
          <region>MD</region>
          <code>610225</code>
          <country>China</country>
        </postal>
        <uri>http://www.cuit.edu.cn/</uri>
      </address>
    </author>
    <author initials="J." surname="Rao" fullname="Jin-tao Rao">
      <organization>College of Information Security Engineering, Chengdu University of Information Technology</organization>
      <address>
        <postal>
          <street>No. 24 Block 1, Xuefu Road</street>
          <city>Chengdu</city>
          <region>MD</region>
          <code>610225</code>
          <country>China</country>
        </postal>
        <uri>http://www.cuit.edu.cn/</uri>
      </address>
    </author>
    <date month='October' year='2015'/>
  </front>
</reference>
</references>

<section anchor="acknowledgements" title="Acknowledgements">
<t>The authors would like to thank the following persons for their valuable advice
and input.
</t>
<t>
<list style="symbols">
<t>The Ribose RNP team for their input and implementation</t>
</list>
</t>
</section>

</back>
</rfc>
