GM/T 0008-2012 PDF English
US$145.00 · In stock · Download in 9 secondsGM/T 0008-2012: Cryptography test criteria for security IC Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GM/T 0008-2012 | English | 145 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cryptography test criteria for security IC
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0008-2012
GM/T 0008-2012: Cryptography test criteria for security IC---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0008-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
ICS 35.040
L 80
RECORD NO.. 38306-2013
Cryptography test criteria for security IC
Issued on. NOVEMBER 22, 2012
Implemented on. NOVEMBER 22, 2012
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms, definitions and abbreviations... 6
4 Classification of security levels... 10
5 Cryptographic algorithm... 11
6 Security chip interface... 15
7 Key management... 16
8 Sensitive information protection... 19
9 Firmware security... 21
10 Self-test... 23
11 Audit... 23
12 Attack mitigation and protection... 24
13 Life cycle assurance... 27
Bibliography... 31
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document
may be the subject of patent rights. The issuer of this document shall not be
held responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of the State
Cryptography Administration.
The drafting organizations of this Standard. Commercial Cryptography Testing
Centre of State Cryptography Administration, State Key Laboratory of
Information Security, Tsinghua University, Beijing Hongsi Electronic
Technologies Co., Ltd., Nationz Technologies Co., Ltd., Beijing CEC Huada
Electronic Design Co., Ltd., Zhejiang University, Shenzhen Institutes of
Advanced Technology of Chinese Academy of Sciences, Datang
Microelectronics Co., Ltd., Beijing Xinguang-Tiandi IC Design Co., Ltd.,
Chengdu University of Information Technology.
The main drafters of this Standard. Li Dawei, Zhou Yongbin, Luo Peng, Liu Jiye,
Zhang Jianren, Zhang Wenjing, Zhang Yiwei, Chen Lizhi, Ye Yin, Shen Haibin,
Li Huiyun, Sun Dongyu, Xiong Yanping, Liu Hongwei, Chen Yun, Wu Zhen, Mao
Yingying.
1 Scope
This Standard specifies three security levels of security capabilities which
increase in sequence and the cryptographic test requirements which are
applicable to the security chips of all security levels.
This Standard applies to both the cryptographic test of security chips and the
development of security chips.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the edition dated applies to this
document. For undated references, the latest edition of the referenced
documents (including all amendments) applies to This Standard.
GM/T 0005, Randomness test specification
3 Terms, definitions and abbreviations
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
key
Key information or parameters which control cryptographic transformation
operation.
3.1.2
sensitive information
Data in security chips which requires protection, except keys.
3.1.3
security chip
Integrated circuit chips which contain cryptographic algorithms and security
functions and can implement key management mechanisms.
3.1.4
security capability
Direct or indirect assurance and protective measures which are provided by
security chips for keys and sensitive information.
3.1.5
block cipher operation mode
The operation mode of block cipher algorithm, mainly including electronic code
book mode (ECB), cipher block chaining mode (CBC), cipher feedback mode
(CFB), output feedback mode (OFB), counter mode (CTR), etc.
3.1.6 public key cipher application mode
The application mode of public key cipher algorithm, mainly including
encryption/decryption, signature/verification, key agreement, etc.
3.1.7
operation speed of cryptographic algorithm
Maximum data size that security chips can process within the unit time of
cryptographic algorithm implementation.
3.1.8
physical random source
Source blocks of random sequences which is generated by the uncertainty of
physical noise.
3.1.9
firmware
Procedure codes which is solidified in security chips, controlling and
coordinating the cryptography and security functions of security chips.
4 Classification of security levels
4.1 Security level 1
Security level 1 specifies the minimum security level requirements that the
security capabilities of security chips shall meet. Security level 1 requires
security chips to provide basic protective measures for keys and sensitive
information.
4.2 Security level 2
Security level 2 specifies the intermediate security level requirements that the
security capabilities of security chips can meet. Based on security level 1,
4.3 Security level 3
Security level 3 specifies the high security level requirements that the security
capabilities of security chips can meet. Based on security level 2, security level
3 specifies the logical and/or physical protective measures that security chips
shall have.
5 Cryptographic algorithm
5.1 Random number generator
5.1.1 Security level 1
5.1.2 Security level 2
5.2 Block cipher algorithm
5.2.1 Security level 1
5.2.2 Security level 2
Based on security level 1.
a) Security chips are capable of giving clear results or responses for any data
input.
b) The central operation parts of the block cipher algorithm supported by
security chips shall be implemented using special hardware circuits.
5.2.3 Security level 3
Based on security level 2.
a) The block cipher algorithm supported by security chips shall be
implemented using special hardware circuits.
b) Security chips themselves can verify the correctness of the block cipher
algorithm supported by them in all operating modes.
5.3 Public key cipher algorithm
5.5 Stream cipher algorithm
5.5.1 Security level 1
a) All stream cipher algorithms supported by security chips shall be
implemented correctly.
b) Security chips shall determine the operation rate of the stream cipher
algorithms.
5.5.2 Security level 2
5.5.3 Security level 3
Based on security level 2.
6 Security chip interface
6.1 Physical interface
6.1.1 Security level 1
6.1.2 Security level 2
Based on security level 1, security chips shall not contain any physical interface
except the physical interfaces declared.
6.1.3 Security level 3
Based on security level 2.
6.2 Logical interface
6.2.1 Security level 1
a) The logical interfaces supported by security chips shall not contain covert
channels.
b) The operation data of the cryptographic algorithm shall be consistent,
which is input and output by the logical interfaces supported by security
chips.
c) If security chips support the random number generation function, all the
random numbers output by the logical interfaces supported by security
chips are capable of passing the randomness test.
7 Key management
7.1 Generation
7.1.1 Security level 1
7.1.2 Security level 2
Based on security level 1.
a) Security chips shall not disclose relevant information of keys through
physical interfaces or logical interfaces during the key generation process.
b) After the generation of keys, security chips shall immediately eliminate
relevant data and temporary data which is used during the generation of
keys and will no longer be used.
7.1.3 Security level 3
As security level 2.
7.2 Storage
7.2.1 Security level 1
Security chips are capable of storing keys correctly and effectively.
7.3 Usage
7.3.1 Security level 1
Security chips shall be capable of using keys correctly and effectively in
accordance with key types, application scenarios, etc.
7.3.2 Security level 2
Based on security level 1.
a) The storage region of security chips for the storage keys and key related
information during the usage of keys shall be controllable and special.
b) During the usage of keys, the physical interfaces and logical interfaces of
security chips shall not disclose keys and related information.
7.4 Update
7.4.1 Security level 1
Security chips shall be capable of updating keys correctly and effectively.
7.4.2 Security level 2
Based on security level 1.
7.4.3 Security level 3
As security level 2.
7.5 Import
7.5.1 Security level 1
Security chips shall be capable of importing keys correctly and effectively.
7.5.2 Security level 2
Based on security level 1.
a) The import of keys requires corresponding authorization.
b) Security chips shall support importing keys in the form of ciphertexts.
7.5.3 Security level 3
As security level 2.
7.6 Export
7.6.1 Security level 1
Security chips are capable of exporting keys correctly and effectively.
8 Sensitive information protection
8.1 Storage
8.1.1 Security level 1
Security chips are capable of storing sensitive information correctly and
effectively.
8.2 Clearing
8.2.1 Security level 1
Security chips are capable of clearing sensitive information correctly and
effectively.
8.2.2 Security level 2
Based on security level 1.
8.2.3 Security level 3
Based on security level 2, security chips shall support the secure key clearing
mechanism which is implemented using the methods including repeated
erasing.
8.3 Operation
8.3.1 Security level 1
a) Security chips shall be capable of conducting operation for sensitive
information correctly and effectively.
b) Security chips shall not export sensitive information during the operation
process.
8.4 Transmission
8.4.1 Security level 1
Security chips shall be capable of importing or exporting sensitive information
permissible for transmission correctly and effectively, as needed.
8.4.2 Security level 2
Based on security level 1.
9 Firmware security
9.1 Storage
9.1.1 Security level 1
The firmware in security chips shall not be read out through interfaces.
9.1.2 Security level 2
Based on security level 1.
9.2 Implementation
9.2.1 Security level 1
a) Security chips shall be capable of implementing the functions declared
correctly and effectively.
b) The firmware of security chips shall not implement the functions which are
not declared.
9.2.2 Security level 2
Based on security level 1, security chips shall take the measures such as
exception handling mechanism, to ensure the robustness and integrity of
firmware itself.
9.3 Import
9.3.1 Security level 1
Security chips shall implement the import of firmware correctly and effectively.
GM/T 0008-2012
GM
CRYPTOGRAPHY INDUSTRY STANDARD
ICS 35.040
L 80
RECORD NO.. 38306-2013
Cryptography test criteria for security IC
Issued on. NOVEMBER 22, 2012
Implemented on. NOVEMBER 22, 2012
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms, definitions and abbreviations... 6
4 Classification of security levels... 10
5 Cryptographic algorithm... 11
6 Security chip interface... 15
7 Key management... 16
8 Sensitive information protection... 19
9 Firmware security... 21
10 Self-test... 23
11 Audit... 23
12 Attack mitigation and protection... 24
13 Life cycle assurance... 27
Bibliography... 31
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document
may be the subject of patent rights. The issuer of this document shall not be
held responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of the State
Cryptography Administration.
The drafting organizations of this Standard. Commercial Cryptography Testing
Centre of State Cryptography Administration, State Key Laboratory of
Information Security, Tsinghua University, Beijing Hongsi Electronic
Technologies Co., Ltd., Nationz Technologies Co., Ltd., Beijing CEC Huada
Electronic Design Co., Ltd., Zhejiang University, Shenzhen Institutes of
Advanced Technology of Chinese Academy of Sciences, Datang
Microelectronics Co., Ltd., Beijing Xinguang-Tiandi IC Design Co., Ltd.,
Chengdu University of Information Technology.
The main drafters of this Standard. Li Dawei, Zhou Yongbin, Luo Peng, Liu Jiye,
Zhang Jianren, Zhang Wenjing, Zhang Yiwei, Chen Lizhi, Ye Yin, Shen Haibin,
Li Huiyun, Sun Dongyu, Xiong Yanping, Liu Hongwei, Chen Yun, Wu Zhen, Mao
Yingying.
1 Scope
This Standard specifies three security levels of security capabilities which
increase in sequence and the cryptographic test requirements which are
applicable to the security chips of all security levels.
This Standard applies to both the cryptographic test of security chips and the
development of security chips.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the edition dated applies to this
document. For undated references, the latest edition of the referenced
documents (including all amendments) applies to This Standard.
GM/T 0005, Randomness test specification
3 Terms, definitions and abbreviations
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1.1
key
Key information or parameters which control cryptographic transformation
operation.
3.1.2
sensitive information
Data in security chips which requires protection, except keys.
3.1.3
security chip
Integrated circuit chips which contain cryptographic algorithms and security
functions and can implement key management mechanisms.
3.1.4
security capability
Direct or indirect assurance and protective measures which are provided by
security chips for keys and sensitive information.
3.1.5
block cipher operation mode
The operation mode of block cipher algorithm, mainly including electronic code
book mode (ECB), cipher block chaining mode (CBC), cipher feedback mode
(CFB), output feedback mode (OFB), counter mode (CTR), etc.
3.1.6 public key cipher application mode
The application mode of public key cipher algorithm, mainly including
encryption/decryption, signature/verification, key agreement, etc.
3.1.7
operation speed of cryptographic algorithm
Maximum data size that security chips can process within the unit time of
cryptographic algorithm implementation.
3.1.8
physical random source
Source blocks of random sequences which is generated by the uncertainty of
physical noise.
3.1.9
firmware
Procedure codes which is solidified in security chips, controlling and
coordinating the cryptography and security functions of security chips.
4 Classification of security levels
4.1 Security level 1
Security level 1 specifies the minimum security level requirements that the
security capabilities of security chips shall meet. Security level 1 requires
security chips to provide basic protective measures for keys and sensitive
information.
4.2 Security level 2
Security level 2 specifies the intermediate security level requirements that the
security capabilities of security chips can meet. Based on security level 1,
4.3 Security level 3
Security level 3 specifies the high security level requirements that the security
capabilities of security chips can meet. Based on security level 2, security level
3 specifies the logical and/or physical protective measures that security chips
shall have.
5 Cryptographic algorithm
5.1 Random number generator
5.1.1 Security level 1
5.1.2 Security level 2
5.2 Block cipher algorithm
5.2.1 Security level 1
5.2.2 Security level 2
Based on security level 1.
a) Security chips are capable of giving clear results or responses for any data
input.
b) The central operation parts of the block cipher algorithm supported by
security chips shall be implemented using special hardware circuits.
5.2.3 Security level 3
Based on security level 2.
a) The block cipher algorithm supported by security chips shall be
implemented using special hardware circuits.
b) Security chips themselves can verify the correctness of the block cipher
algorithm supported by them in all operating modes.
5.3 Public key cipher algorithm
5.5 Stream cipher algorithm
5.5.1 Security level 1
a) All stream cipher algorithms supported by security chips shall be
implemented correctly.
b) Security chips shall determine the operation rate of the stream cipher
algorithms.
5.5.2 Security level 2
5.5.3 Security level 3
Based on security level 2.
6 Security chip interface
6.1 Physical interface
6.1.1 Security level 1
6.1.2 Security level 2
Based on security level 1, security chips shall not contain any physical interface
except the physical interfaces declared.
6.1.3 Security level 3
Based on security level 2.
6.2 Logical interface
6.2.1 Security level 1
a) The logical interfaces supported by security chips shall not contain covert
channels.
b) The operation data of the cryptographic algorithm shall be consistent,
which is input and output by the logical interfaces supported by security
chips.
c) If security chips support the random number generation function, all the
random numbers output by the logical interfaces supported by security
chips are capable of passing the randomness test.
7 Key management
7.1 Generation
7.1.1 Security level 1
7.1.2 Security level 2
Based on security level 1.
a) Security chips shall not disclose relevant information of keys through
physical interfaces or logical interfaces during the key generation process.
b) After the generation of keys, security chips shall immediately eliminate
relevant data and temporary data which is used during the generation of
keys and will no longer be used.
7.1.3 Security level 3
As security level 2.
7.2 Storage
7.2.1 Security level 1
Security chips are capable of storing keys correctly and effectively.
7.3 Usage
7.3.1 Security level 1
Security chips shall be capable of using keys correctly and effectively in
accordance with key types, application scenarios, etc.
7.3.2 Security level 2
Based on security level 1.
a) The storage region of security chips for the storage keys and key related
information during the usage of keys shall be controllable and special.
b) During the usage of keys, the physical interfaces and logical interfaces of
security chips shall not disclose keys and related information.
7.4 Update
7.4.1 Security level 1
Security chips shall be capable of updating keys correctly and effectively.
7.4.2 Security level 2
Based on security level 1.
7.4.3 Security level 3
As security level 2.
7.5 Import
7.5.1 Security level 1
Security chips shall be capable of importing keys correctly and effectively.
7.5.2 Security level 2
Based on security level 1.
a) The import of keys requires corresponding authorization.
b) Security chips shall support importing keys in the form of ciphertexts.
7.5.3 Security level 3
As security level 2.
7.6 Export
7.6.1 Security level 1
Security chips are capable of exporting keys correctly and effectively.
8 Sensitive information protection
8.1 Storage
8.1.1 Security level 1
Security chips are capable of storing sensitive information correctly and
effectively.
8.2 Clearing
8.2.1 Security level 1
Security chips are capable of clearing sensitive information correctly and
effectively.
8.2.2 Security level 2
Based on security level 1.
8.2.3 Security level 3
Based on security level 2, security chips shall support the secure key clearing
mechanism which is implemented using the methods including repeated
erasing.
8.3 Operation
8.3.1 Security level 1
a) Security chips shall be capable of conducting operation for sensitive
information correctly and effectively.
b) Security chips shall not export sensitive information during the operation
process.
8.4 Transmission
8.4.1 Security level 1
Security chips shall be capable of importing or exporting sensitive information
permissible for transmission correctly and effectively, as needed.
8.4.2 Security level 2
Based on security level 1.
9 Firmware security
9.1 Storage
9.1.1 Security level 1
The firmware in security chips shall not be read out through interfaces.
9.1.2 Security level 2
Based on security level 1.
9.2 Implementation
9.2.1 Security level 1
a) Security chips shall be capable of implementing the functions declared
correctly and effectively.
b) The firmware of security chips shall not implement the functions which are
not declared.
9.2.2 Security level 2
Based on security level 1, security chips shall take the measures such as
exception handling mechanism, to ensure the robustness and integrity of
firmware itself.
9.3 Import
9.3.1 Security level 1
Security chips shall implement the import of firmware correctly and effectively.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0008-2012 be delivered?Answer: The full copy PDF of English version of GM/T 0008-2012 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0008-2012_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0008-2012_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0008-2012 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0008-2012?A step-by-step guide to download PDF of GM/T 0008-2012_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0008-2012". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|