|
US$519.00 · In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 33746.2-2017: Technical specification of NFC security -- Part 2: Security mechanism requirements Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 33746.2-2017 | English | 519 |
Add to Cart
|
5 days [Need to translate]
|
Technical specification of NFC security -- Part 2: Security mechanism requirements
| Valid |
GB/T 33746.2-2017
|
PDF similar to GB/T 33746.2-2017
Basic data | Standard ID | GB/T 33746.2-2017 (GB/T33746.2-2017) | | Description (Translated English) | Technical specification of NFC security -- Part 2: Security mechanism requirements | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 26,281 | | Date of Issue | 2017-09-07 | | Date of Implementation | 2018-01-01 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |
GB/T 33746.2-2017: Technical specification of NFC security -- Part 2: Security mechanism requirements ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Technical specification of NFC security - Part 2. Security mechanism requirements
ICS 35.040
L80
National Standards of People's Republic of China
Near Field Communication (NFC) security technology requirements
Part 2. Requirements for safety mechanisms
Part 2.Securitymechanismrequirements
(ISO /IEC 13157-2.2010, Informationtechnology-
systems-NFCSecurity-Part 2.Securitymechanismrequirements,
NFC-SECcryptography standard usingECDHandAES, MOD)
2017-09-07Published.2018-01-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
China National Standardization Administration released
Directory
Foreword Ⅲ
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 conventions and notations 1
4.1 level with 1
4.2 hexadecimal number 1
5 Abbreviations 2
6 Compliance 3
7 Summary 3
8 Protocol Identifier (PID) 3
9 primitive 3
9.1 Features of the Primitive Summary 3
9.2 Key Agreement 4
9.3 Key derivation function 4
9.4 Key Usage 5
9.5 Key Confirmation 5
9.6 Data Encryption 6
9.7 Data Integrity 6
9.8 Information Sequence Integrity 6
Data Conversion 7
10.1 integer to byte string conversion 7
10.2 byte string to integer conversion 7
10.3 to the byte string conversion 7
10.4 byte string to point conversion 7
11 SSE and SCH service calls 7
11.1 Overview 7
11.2 Prerequisites 8
11.3 Key Agreement 8
11.4 Key Export 9
11.5 Key Confirmation 9
12 SCH Data Exchange 10
12.1 Overview 10
12.2 Preparation 11
12.3 Data Exchange 11
Appendix A (Normative) SM4-XCBC-PRF-128 and SM4-XCBC-MAC-96 Algorithm 13
A.1 SM4-XCBC-PRF-128 13
A.2 SM4-XCBC-MAC-96 13
Appendix B (Normative) Field Length 14
Appendix C (Normative) NEAU-A authentication mechanism 15
C.1 NEAU-A Authentication Mechanism Overview 15
C.2 Preparation 15
C.3 Support Trusted Third Party TTP Identification Process 16
C.4 does not support trusted third-party TTP authentication process 17
C.5 Key derivation 18
Appendix D (Normative) NEAU-S authentication mechanism 19
D.1 NEAU-S Authentication Mechanism Overview 19
D.2 Preparation 19
D.3 Procedure 19
Foreword
GB/T 33746 "Near Field Communication (NFC) safety technology requirements" is divided into the following two parts.
--- Part 1. NFCIP-1 security services and protocols;
--- Part 2. Safety requirements.
This section GB/T 33746 Part 2.
This section drafted in accordance with GB/T 1.1-2009 given rules.
This section uses the redrafted law to amend the use of ISO /IEC 13157-2.2010 "Information technology systems for communication and information exchange
NFC Security Part 2. Security Mechanism Requirements, Cryptographic Criteria Using ECDH and AES. "
This part of ISO /IEC 13157-2.2010 technical differences and the reasons are as follows.
--- Standard English name changed to TechnicalspecificationofNFCsecurity-Part 2.Securitymechanism
requirements
--- Increased 3 normative references;
--- Added 5 abbreviations;
--- Delete the original data Appendix C, an increase of 2 normative Appendix C and Appendix D;
--- Replace AES with a password algorithm that complies with the national password management rules.
This part of the National Information Security Standardization Technical Committee (SAC/TC260) and focal point.
This part of the drafting unit. Ministry of Industry and Information Technology Telecommunications Research Institute, Xi'an Jietong Wireless Network Communications Co., Ltd., the national radio
Frequency Identification Product Quality Supervision and Inspection Center, China Article Coding Center.
The main drafters of this section. Sun Qian, Zhang Linlin, Yang Jun, Du Zhiqiang, Hu Yanan, Yan Ruo, Jiang Guoqiang, Li Zhimin, Luo Yan.
Introduction
This part of the user is the communications industry manufacturing enterprises, testing agencies and technology agencies.
The issuing authority of this document draws attention to the fact that statements that conform to this document may relate to Appendix C and "An Entity Bidirectional Identification Method"
D and the use of "a method based on symmetric cryptographic algorithms and authentication methods and systems" and other related patents.
The issuing authority of this document has no position regarding the authenticity, validity and scope of the above patents.
The patentee has assured the issuing authority of this document that he is willing to work with any applicant on terms and conditions reasonably non-discriminatory
Patent licensing negotiations. The patent holder's statement has been filed with the issuing authority of this document. Related information is available through the following link
Department obtained.
Patentee Xi'an Xi Jie Jietong Wireless Network Communications Co., Ltd
Address. 68 # Science and Technology Road, Xi'an High-tech Zone, Xi'an Software Park, Qin Feng Club A201
Contact. Liu Changchun
Postal code .710075
Email .ipri @ iwncomm.com
Phone .029-87607836
Fax .029-87607829
Please note that in addition to the above patents, some of the contents of this document may involve patents. The issuing authority of this document does not undertake to identify these patents
Responsibility.
Near Field Communication (NFC) security technology requirements
Part 2. Requirements for safety mechanisms
1 Scope
GB/T 33746 provisions of this part of the agreement identifier PID 01 message content and encryption methods. This section of the password mechanism
Is using the SM2 key exchange protocol as the key agreement protocol and the SM4 block cipher algorithm for data encryption and integrity protection.
This section applies to the security mechanism in the establishment of NFC security services requirements.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
Information security technology block cipher algorithm working mode
GB/T 28455-2012 Information security technology to introduce trusted third-party entity authentication and access architecture specification
GB/T 33746.1-2017 Near Field Communication (NFC) security technology requirements Part 1. NFCIP-1 Security Services and Protocols
(ISO /IEC 13157-1.2010, MOD)
GM/T 0002-2012 SM4 Block Cipher Algorithm
GM/T 0003-2012 SM2 Elliptic Curve Public Key Crypto Algorithm
ISO /IEC 9798-3.1998/Amd.1.2010 Information technology - Security technology - Entity identification - Part 3. Use of digital signatures
Technical Mechanisms Supplement 1 (Informationtechnology-Securitytechniques-Entityauthentication-Part 3.
Mechanisms using digitignature techniques-Amendment 1)
ISO /IEC 18092-2004 Information technology - Telecommunications and information exchange between systems - Near-field communication interfaces and protocols
NFCIP-1 [Informationtechnology-Telecommunications and information exchange between systems-
NearFieldCommunication-Interface and Protocol (NFCIP-1)]
ISO /IEC .20009-2.2013 Information technology - Security technology Anonymous entity authentication Part 2. Group public key technology
Mechanism (Informationtechnology-Securitytechniques-Anonymousentityauthentication-Part 2.Mech-
anismsbasedonsignaturesusingagrouppublickey)
3 Terms and definitions
GB/T 33746.1-2017 defined terms and definitions apply to this document.
4 conventions and notations
4.1 level even
A∥B represents the concatenation of field A and field B. The B content follows the A content.
4.2 hexadecimal digits
(XY) Represents the XY hexadecimal number (that is, in base 16), each pair of characters is encoded as a single byte.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 33746.2-2017_English be delivered?Answer: Upon your order, we will start to translate GB/T 33746.2-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 33746.2-2017_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 33746.2-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|