|
US$289.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 27929-2025: Financial services - Requirements for message authentication using symmetric techniques Status: Valid GB/T 27929: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 27929-2025 | English | 289 |
Add to Cart
|
3 days [Need to translate]
|
Financial services - Requirements for message authentication using symmetric techniques
| Valid |
GB/T 27929-2025
|
| GB/T 27929-2011 | English | 689 |
Add to Cart
|
5 days [Need to translate]
|
Banking -- Requirements for message authentication using symmetric techniques
| Valid |
GB/T 27929-2011
|
PDF similar to GB/T 27929-2025
Basic data | Standard ID | GB/T 27929-2025 (GB/T27929-2025) | | Description (Translated English) | Financial services - Requirements for message authentication using symmetric techniques | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | A11 | | Classification of International Standard | 35.240.40 | | Word Count Estimation | 14,137 | | Date of Issue | 2025-06-30 | | Date of Implementation | 2025-10-01 | | Older Standard (superseded by this standard) | GB/T 27929-2011 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 27929-2025: Financial services - Requirements for message authentication using symmetric techniques ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT27929-2025
ICS 35.240.40
CCSA11
National Standard of the People's Republic of China
Replaces GB/T 27929-2011
Financial services use symmetric encryption technology for messages
Identification requirements
symmetric techniques
Released on June 30, 2025
Implementation on October 1, 2025
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 General Principles 3
4.1 Protection of Authentication Keys 3
4.2 Message Authentication Elements 3
4.3 Detection of duplicate, lost or out-of-sequence messages 3
5 Message Authentication Process 4
5.1 MAC Generation 4
5.2 MAC Location 4
5.3 MAC Verification 4
5.4 Message Authentication Mechanism Based on GB/T 15852 4
5.4.1 Overview 4
5.4.2 Message Authentication Mechanism Based on GB/T 15852.1 4
5.4.3 Message Authentication Mechanism Based on GB/T 15852.2 6
5.4.4 Message Authentication Mechanism Based on GB/T 15852.3 6
5.4.5 Implementation Recommendation 7
Appendix A (Informative) Using MIDs to Prevent Duplication and Loss 8
A.1 Purpose 8
A.2 Preventing Duplication 8
A.2.1 Duplicate Messages 8
A.2.2 Multi-party processing 8
A.2.3 Include identity 8
A.3 Loss Detection 8
Appendix B (Informative) General Guidance Information 9
Reference 10
Preface
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
This document replaces GB/T 27929-2011 "Requirements for message authentication using symmetric encryption technology in banking services" and
Compared with GB/T 27929-2011, in addition to structural adjustments and editorial changes, the main technical changes are as follows.
a) The terms “authentication”, “authentication algorithm”, “authentication element”, “deviation”, “cryptanalysis”, “data integrity”, “data source authentication”, “decryption”, etc. have been deleted.
"Secret", "Separator", "Hexadecimal Number", "Message Body", "Current Random Number" (see 3.2, 3.3, 3.4, 3.8, 3.10,.2011 Edition)
3.11, 3.13, 3.14, 3.15, 3.17, 3.23, 3.24), added the term "generalized hash function" (see 3.16), changed the term "message
Definition of "Message Authentication Code (MAC) Algorithm" (see 3.9 and 3.10, 3.19 and 3.20 of the.2011 Edition);
b) Deleted the requirements for the preparation phase of the message authentication process, message format, and key generation (see 5.1 to 5.3 of the.2011 edition);
c) Added SM4 and AES algorithms (see 5.4.2), and deleted the DEA algorithm (see 6.1.4 of the.2011 edition);
d) Added SM3, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-
512/256, SHA3-224, SHA3-256, SHA3-384 and SHA3-512 algorithms (see 5.4.3), SHA-1 and
RIPEMD-128 algorithm (see 6.2 of the.2011 edition);
e) Added UMAC, Poly1305-AES and GMAC algorithms (see 5.4.4).
This document is modified to adopt ISO 16609.2022 “Requirements for message authentication using symmetric cryptographic techniques in financial services”.
This document has the following structural adjustments compared to ISO 16609.2022.
--- The fifth paragraph of 5.3 corresponds to the fifth paragraph of the introduction to ISO 16609.2022.
The technical differences between this document and ISO 16609.2022 and their reasons are as follows.
--- The term "check code" in ISO 16609.2022 has been deleted because the text does not contain any relevant content about check code;
--- Change ISO 8583-1 to ISO 8583 (see Chapter 3). ISO 8583-1 has been replaced by ISO 8583;
--- Change ISO 11568-1 and ISO 11568-2 to ISO 11568 (see 4.1). ISO 11568-1 and ISO 11568-2 have been
ISO 11568 replaced;
---Changed TDEA to the algorithm name 3DES that conforms to my country's usage habits, added MAC algorithm 7 (TrCBC) and MAC
Algorithm 8 (CBCR) (see 5.4.2) to correspond to GB/T 15852.1-2020.
The following editorial changes have been made to this document.
--- Replace ISO /IEC 9797 (all parts) with the informative reference GB/T 15852 (all parts);
--- Deleted the informative reference to NISTSP800-107 in Note 2 of Table 2 of ISO 16609.2022.
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document is under the jurisdiction of the National Financial Standardization Technical Committee (SAC/TC180).
This document was drafted by. China Financial Certification Center Co., Ltd., Shandong University of Finance and Economics, Shandong University of Science and Technology, Beijing National Financial Standardization Administration
Research Institute Co., Ltd., China UnionPay Co., Ltd., China National NetsPay Clearing Co., Ltd., and Tsinghua University.
The main drafters of this document are. Zhu Gang, Xie Zongxiao, Ma Chunwang, Li Da, Wang Zichong, Li Enda, Wu Lidong, Dong Yanan, Dong Kunxiang, Zhen Jie,
Zhou Xichong, Xie Yanli, Bo Shuntian, He Yu, Tang Yang, Guo Lin, Yang Meng, and Xia Zeyu.
The previous versions of this document and the documents it replaces are as follows.
---First published in.2011 as GB/T 27929-2011;
---This is the first revision.
Financial services use symmetric encryption technology for messages
Identification requirements
1 Scope
This document establishes the methods used to protect the integrity of financial services business messages or stored data and to verify that messages originate from authorized sources.
The process is independent of the transport process used. Approved block cipher algorithms that support message authentication code (MAC) calculations are also provided.
The authentication methods defined in this document apply to data stored in coded character sets or binary form and to data formatted and transmitted.
message.
This document applies to symmetric algorithms where the sender and receiver use the same key and does not specify how to generate the shared key.
Use does not prevent internal fraud at the sender and receiver, or forgery of the MAC by the receiver.
2 Normative references
The contents of the following documents constitute the essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
ISO 8583 Financial-transaction-card-originatedmessages-
Note. GB/T 15150-1994 Bank Card Interchange Message Specification for Financial Transaction Content (ISO 8583.1987, IDT)
Note. GB/T 27909.1-2011 Banking Key Management (Retail) Part 1.General Principles (ISO 11568-1.2005, MOD)
GB/T 27909.2-2011 Banking Key Management (Retail) Part 2.Symmetric Cryptography and Key Management and Lifecycle
(ISO 11568-2.2005,MOD)
GB/T 27909.3-2011 Banking Key Management (Retail) Part 3.Asymmetric Cryptography Systems and Key Management and Lifecycle
(ISO 11568-4.2007,MOD)
3 Terms and Definitions
For the purposes of this document, the terms and definitions defined in ISO 8583 and the following apply.
3.1
algorithm
A mathematical procedure or rule to be followed in calculation to obtain a specified result.
3.2
authenticationkey
The encryption key used in the authentication process.
3.3
beneficiary
The final party to whom funds are transferred as a credit or payment.
Note. There may be more than one beneficiary.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 27929-2025_English be delivered?Answer: Upon your order, we will start to translate GB/T 27929-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 27929-2025_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 27929-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 27929-2025?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 27929-2025 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|