GM/T 0012-2020 PDF English
US$1820.00 · In stock · Download in 9 secondsGM/T 0012-2020: Trusted computing - Trusted computing interface specification of trusted cryptography module Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid GM/T 0012: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0012-2020 | English | 1820 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Trusted computing - Trusted computing interface specification of trusted cryptography module
| Valid |
GM/T 0012-2012 | English | 700 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Trusted computing--Interface specification of trusted cryptography module
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0012-2020
GM/T 0012-2020: Trusted computing - Trusted computing interface specification of trusted cryptography module ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0012-2020
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
CCS L 80
Replacing GM/T 0012-2012
Trusted computing - Trusted computing interface
specification of trusted cryptography module
Issued on. DECEMBER 28, 2020
Implemented on. JULY 01, 2021
Issued by. National Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 6
1 Scope... 7
2 Normative references... 7
3 Terms and definitions... 7
4 Abbreviations... 12
5 Overview of trusted cryptographic module functions... 13
5.1 Trusted computing platform... 13
5.2 Trusted cryptographic module... 16
6 Functional interface of trusted cryptographic module... 17
6.1 General requirements... 17
6.2 Startup command... 17
6.3 Test command... 18
6.4 Session commands... 20
6.5 Object commands... 22
6.6 Duplicate command... 29
6.7 Asymmetric algorithm commands... 33
6.8 Symmetric algorithm commands... 37
6.9 Random number generator commands... 38
6.10 HASH/HMAC commands... 39
6.11 Certificate commands... 45
6.12 Ephemeral EC key command... 48
6.13 Signature and signature verification commands... 50
6.14 Measurement commands... 52
6.15 Enhanced authorization commands... 54
6.16 Hierarchical commands... 64
6.17 Dictionary attack command... 69
6.18 Management function commands... 70
6.19 Context management commands... 71
6.20 Performance commands... 74
6.21 NV operation command... 75
Appendix A (Normative) Data structure... 85
Foreword
This document is drafted in accordance with the provisions of GB/T 1.1-2020
"Directives for standardization - Part 1.Rules for the structure and drafting of
standardizing documents".
This document replaces GM/T 0012-2012 "Trusted computing - Trusted computing
interface specification of trusted cryptography module".
Compared with GM/T 0012-2012, the main technical changes of this document are as
follows.
a) MODIFY the content of the preface and introduction;
b) MODIFY Chapter 3 "Terms, definitions, abbreviations" of the original standard,
revising it to Chapter 3 in accordance with the requirements of GB/T1.1-2020,
meanwhile modifying and adding the content of terms and definitions;
c) DELETE the content of Chapter 4 "Overview" of the original standard;
d) ADD the Chapter 4 "Abbreviations", adding and modifying some content;
e) DELETE the content of Chapter 5, Chapter 6, Chapter 7, Chapter 8 of the original
standard;
f) ADD the Chapter 5 "Functional overview of trusted cryptographic modules";
g) ADD the content of Chapter 6 "Functional interface of trusted cryptographic
module", which refers to ISO/IEC 11889-3.2015;
h) ADD the 6.7, the implementation requirements for SM2 asymmetric encryption
and decryption instructions;
i) MODIFY the normative appendix A "Data structure", which refers to ISO/IEC
11889-2.2015.
Please note that some contents of this document may refer to patents. The issuing
agency of this document assumes no responsibility for identifying patents.
This document was proposed by AND shall be under the jurisdiction of the Encryption
Industry Standardization Technical Committee.
Drafting organizations of this document. National Technology Co., Ltd., Legend
Holdings Co., Ltd., Valley Network Security Technology Co., Ltd., Tongfang Co., Ltd.,
Institute of Software of Chinese Academy of Sciences, Changchun Jida Zhengyuan
Information Technology Co., Ltd., China Great Wall Computer Shenzhen Co., Ltd.,
Chengdu Weishitong Information Industry Co., Ltd., Wuxi Jiangnan Information
Security Engineering Technology Center, National University of Defense Technology
of the Chinese People's Liberation Army, Beijing Information Technology University,
Beijing Zhuoshi Network Security Technology Co., Ltd., Beijing Tianrongxin Network
Security Technology Co., Ltd..
The main drafters of this document. Fan Qin, Liu Xin, Fu Yuepeng, Qin Yu, Gu
Jingzhong, Wu Qiuxin, Yang Xianwei, Zou Hao, Yu Fajiang, Ning Xiaokui, Wang Zi,
Zheng Bike, Lin Yang, Li Weiping, Lei Xiao Feng, Xu Zhen, Yao Jinlong, Yan Fei, Li
Feng, Xu Yong, Jia Bing, Wang Lei, Gu Jian, He Changlong, Liu Ren.
This standard replaces the standard previously issued as follows.
- GM/T 0012-2012.
1 Scope
This document describes the functions of the trusted cryptographic module; defines the
command interface of the trusted cryptographic module in detail.
2 Normative references
The contents of the following documents constitute the essential provisions of this
document through normative references in the text. Among them, for dated references,
only the version corresponding to the date applies to this document; for undated
references, the latest version (including all amendments) applies to this document.
GB/T 20518 Information security technology - Public key infrastructure - Digital
certificate format
3 Terms and definitions
The following terms and definitions apply to this document.
A supporting platform, which is built in the computing system, to realize the trusted
computing function.
4 Abbreviations
The following abbreviations apply to this document.
5 Overview of trusted cryptographic module functions
TCM is an essential key basic component of the trusted computing cryptographic
support platform, providing independent cryptographic algorithm support.
6 Functional interface of trusted cryptographic module
This command allows injecting secret information into TCM, by symmetric or
asymmetric protection.
This command returns the enhanced authorization session to its original state. This
command will be used, when TCM returns TCM2_RC_PCR_CHANGED.
This command is used to create an object, that can be loaded into the TCM, by the
TCM2_Load command.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0012-2020 be delivered?Answer: The full copy PDF of English version of GM/T 0012-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0012-2020_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0012-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0012-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds. Question 5: Should I purchase the latest version GM/T 0012-2020?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0012-2020 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
How to buy and download a true PDF of English version of GM/T 0012-2020?A step-by-step guide to download PDF of GM/T 0012-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0012-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|