GM/T 0006-2023 PDF English
US$380.00 · In stock · Download in 9 secondsGM/T 0006-2023: Cryptographic application identifier criterion specification Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid GM/T 0006: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GM/T 0006-2023 | English | 380 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cryptographic application identifier criterion specification
| Valid |
| GM/T 0006-2012 | English | 150 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cryptographic application identifier criterion specification
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0006-2023
Similar standards GM/T 0010
GM/T 0006-2023: Cryptographic application identifier criterion specification---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0006-2023
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.030
CCS L 80
Replacing GM/T 0006-2012
Cryptographic Application Identifier Criterion Specification
Issued on: DECEMBER 4, 2023
Implemented on: JUNE 1, 2024
Issued by. State Cryptography Administration
Table of Contents
Foreword... 3
Introduction... 5
1 Scope... 6
2 Normative References... 6
3 Terms and Definitions... 6
4 Abbreviations... 6
5 Format and Encoding of Identifiers... 7
6 Cryptographic Service Class Identifiers... 8
6.1 Overview... 8
6.2 Algorithm Identifiers... 8
6.3 Data Identifiers... 11
6.4 Protocol Identifiers... 16
7 Security Management Class Identifiers... 17
7.1 Overview... 17
7.2 Role Management Identifiers... 17
7.3 Key Management Identifiers... 18
7.4 System Management Identifiers... 20
7.5 Device Management Identifiers... 20
8 Object Identifiers... 23
Bibliography... 28
Foreword
This document was drafted in accordance with the rules provided in GB/T 1.1-2020 Directives
for Standardization - Part 1.Rules for the Structure and Drafting of Standardizing Documents.
This document serves as a replacement for GM/T 0006-2012 Cryptographic Application
Identifier Criterion Specification. In comparison with GM/T 0006-2012, apart from structural
adjustments and editorial modifications, the main technical changes are as follows.
a) The SSF33 block cipher algorithm identifier is deleted (see 5.2.1 of Version 2012),
and the SHA1 cryptographic hash algorithm identifier is deleted (see 5.2.3 of Version
2012);
b) The SM4 and SM7 block cipher algorithm identifiers are added (see 6.2.1), the SM9
IBC asymmetric cryptographic algorithm identifier is added (see 6.2.2), and the
SM3_HMAC and SHA256_HMAC cryptographic hash algorithm identifiers are
added (see 6.2.3);
c) Some certificate parsing item identifiers are added to “Data Identification” (see 6.3.4),
and some interface description identifiers are added to “Protocol Identification” (see
6.4.1);
d) The relevant OID definitions in the commercial cryptography field are modified (see
Chapter 8; Appendix A of Version 2012).
Please be noted that certain content of this document may involve patents. The institution
issuing this document does not undertake the responsibility of identifying these patents.
This document was proposed by and shall be under the jurisdiction of Cryptography
Standardization Technical Committee.
The drafting organizations of this document. Shandong Dean Information Technology Co., Ltd.;
CETC Cyberspace Security Technology Co., Ltd.; Wuxi Jiangnan Information Security
Engineering Technology Center; Xingtang Telecommunication Technology Co., Ltd.; KOAL
Software Co., Ltd.; Beijing Certificate Authority; WANDA Information Co., Ltd.; Changchun
Jiad Zhengyuan Information Technology Co., Ltd.; Beijing Haitai Fangyuan Technology Co.,
Ltd.; Shanghai Electronic Certificate Authority Center Co., Ltd.; Beijing GoMain Technology
Co., Ltd.; China Electric Power Research Institute; Beijing Infosec Technologies Co., Ltd.;
Sansec Technology Co., Ltd.
The main drafters of this document. Liu Ping, Li Zhihu, Liu Xiaodong, Kong Fanyu, Ma
Hongfu, Wang Quanjing, Li Yuanzheng, Xu Qiang, Liu Zengshou, Li Shusheng, Tan Wuzheng,
Zheng Qiang, Li Yufeng, Li Weiping, Cui Jiuqiang, Zhou Dong, Yuan Feng, Wang Zongbin,
Gao Zhiquan.
The issuing of the previous versions.
Cryptographic Application Identifier Criterion Specification
1 Scope
This document describes the cryptographic service class identifiers and security management
class identifiers used in cryptographic applications, and various object identifiers in the field of
commercial cryptography.
This document is applicable to the standardized use of identifiers in the development and use
of cryptographic devices and cryptographic systems, and it is also applicable to the use of
identifiers in the preparation of other relevant standards and protocols.
2 Normative References
The contents of the following documents constitute indispensable clauses of this document
through the normative references in the text. In terms of references with a specified date, only
versions with a specified date are applicable to this document. In terms of references without a
specified date, the latest version (including all the modifications) is applicable to this document.
GM/Z 4001 Cryptology Terminology
3 Terms and Definitions
The terms and definitions defined in GM/Z 4001 and the following are applicable to this
document.
3.1 identifier
An integer used to identify cryptographic algorithms, operational data, cryptographic protocols,
role management, key management, system management, and device management involved in
cryptographic applications.
3.2 network byte order
A data representation format specified by the Big-endian sorting mode.
NOTE. the network byte order is independent of the specific CPU type and operating system, so
that it can be ensured that data can be correctly interpreted when transmitted among
different hosts.
4 Abbreviations
The following abbreviations apply to this document.
BC. Block Chaining
CBC. Cipher Block Chaining
CCM. Counter with CBC-MAC
CFB. Ciphertext Feedback
CRL. Certificate Revocation List
CTR. Counter
DER. Distinguished Encoding Rules
ECB. Electronic Code Book
GCM. Galois Counter Mode
HCTR. universal Hash function based CTR
HMAC. keyed-Hash Message Authentication Code
IBC. Identity-Based Cryptography
MAC. Message Authentication Code
OCSP. Online Certificate Status Protocol
OFB. Output Feedback
OFBNLF. Output Feedback with a Nonlinear Function
OID. Object Identifier
PEM. Privacy-Enhanced Mail
PKI. Public Key Infrastructure
XEX. Xor-Encryption-Xor
XTS. XEX Tweakable Block Cipher with Ciphertext Stealing
5 Format and Encoding of Identifiers
The identifier is a 32-bit unsigned integer type and shall be defined or processed directly as an
integer type during the specific implementation or calling of cryptographic applications.
When transmitting across platforms, in order to avoid the impact or errors caused by the
differences in byte order among different platforms, the identifier shall be processed in the
network byte order of storing high-order bytes at low addresses.
6 Cryptographic Service Class Identifiers
6.1 Overview
The cryptographic service class identifiers define the phrases and data representing the
cryptographic algorithms, operational data and cryptographic protocols involved in the
cryptographic service devices or cryptographic service interfaces. This type of data identifier is
used in the calling process of cryptographic service devices or cryptographic service interfaces,
such as data encryption, digital signature and identity authentication application scenarios.
6.2 Algorithm Identifiers
6.2.1 Block cipher algorithm identifiers
The block cipher algorithm identifiers contain the type of cryptographic algorithm, key length
and encryption mode of the block algorithm. They are used when calling the cryptographic
service object for cryptographic operations or obtaining the cryptographic operational
capabilities of the cryptographic service object.
The encoding rule of the block cipher algorithm identifiers is as follows. from low to high, bits
0 ~ 7 and bits 24 ~ 31 represent the block cipher algorithm working mode bit by bit, and bits 8
~ 15 represent the type of block cipher algorithm bit by bit. For example.
When multiple block cipher algorithms exist at the same time, they can be represented in the
form of “OR”.
The identifiers of block cipher algorithms are shown in Table 1.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0006-2023 be delivered?Answer: The full copy PDF of English version of GM/T 0006-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0006-2023_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0006-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0006-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds. Question 5: Should I purchase the latest version GM/T 0006-2023?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0006-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
How to buy and download a true PDF of English version of GM/T 0006-2023?A step-by-step guide to download PDF of GM/T 0006-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0006-2023". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|