HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0011-2023 PDF English

US$2360.00 · In stock · Download in 9 seconds
GM/T 0011-2023: Trusted computing - Trusted computing functionality and interface specification of cryptographic support platform
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GM/T 0011: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0011-2023English2360 Add to Cart 0-9 seconds. Auto-delivery Trusted computing - Trusted computing functionality and interface specification of cryptographic support platform Valid
GM/T 0011-2012English685 Add to Cart 0-9 seconds. Auto-delivery Trusted computing - Functionality and interface specification of cryptographic support platform Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0011-2023
      

Similar standards

GM/T 0009   

GM/T 0011-2023: Trusted computing - Trusted computing functionality and interface specification of cryptographic support platform


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0011-2023
GM CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.030 CCS L 80 Replacing GM/T 0011-2012 Trusted computing - Trusted computing functionality and interface specification of cryptographic support platform Issued on: DECEMBER 04, 2023 Implemented on: JUNE 01, 2024 Issued by. State Cryptographic Administration

Table of Contents

Foreword... 4 Introduction... 7 1 Scope... 8 2 Normative references... 8 3 Terms and definitions... 9 4 Abbreviations... 13 5 Overview of trusted computing cryptographic support platform... 14 5.1 Trusted computing... 14 5.2 Trusted components... 14 5.3 Trusted computing base... 14 5.4 Trusted boundary... 14 5.5 Trusted Transfer... 15 5.6 Trusted authorization... 15 6 Functions of trusted computing cryptographic support platform... 15 6.1 Platform architecture... 16 6.2 Platform interface functions... 18 7 Trusted cryptographic module interface... 26 7.1 General requirements... 26 7.2 Startup command... 26 7.3 Detection command... 27 7.4 Session command... 29 7.5 Object command... 31 7.6 Copy command... 39 7.7 Asymmetric algorithm commands... 43 7.8 Symmetric algorithm command... 47 7.9 Random number generator command... 48 7.10 Hash/HMAC Commands... 49 7.11 Certify command... 54 7.12 Temporary EC key command... 58 7.13 Signature and signature verification commands... 60 7.14 Measurement command... 62 7.15 Enhanced authorization command... 64 7.16 Hierarchical commands... 74 7.17 Dictionary attack command... 80 7.18 Management function commands... 81 7.19 Context management command... 82 7.20 Property commands... 85 7.21 NV operation command... 86 8 Trusted cryptographic module verification method... 95 Trusted computing - Trusted computing functionality and interface specification of cryptographic support platform

1 Scope

This document gives the system framework and functional principles of the trusted computing cryptographic support platform; specifies the interface specifications of the trusted cryptographic module; describes the corresponding verification methods. This document is applicable to the research, production, evaluation and application development of products related to the trusted computing cryptographic support platform.

2 Normative references

The contents of the following documents constitute the essential terms of this document through normative references in the text. Among them, for referenced documents with dates, only the version corresponding to that date applies to this document; for referenced documents without dates, the latest version (including all amendments) applies to this document. GB/T 20518 Information security technology - Public key infrastructure - Digital certificate format GB/T 25069 Information security techniques - Terminology GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm GB/T 32907 Information security technology - SM4 block cipher algorithm GB/T 32915 Information security technology - Randomness test methods for binary sequence GB/T 32918.2 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 2.Digital signature algorithm GB/T 32918.3 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 3.Key exchange protocol GB/T 32918.4 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 4.Public key encryption algorithm GB/T 35276 Information security technology - SM2 cryptography algorithm usage specification GM/T 0012 Trusted computing - Trusted computing interface specification of trusted cryptography module GM/T 0058 Trusted computing - TCM service module interface specification GM/Z 4001 Cryptographic terminology

3 Terms and definitions

The terms and definitions defined in GB/T 25069 and GM/Z 4001, as well as the following terms and definitions, apply to this document. 3.1 Storage master key The primary key used to protect operating system keys and user keys. 3.2 Trusted computing platform A support system built in a computing system to implement trusted computing functions. 3.3 Cryptographic support platform for trusted computing An important component of a trusted computing platform, including cryptographic algorithms, key management, certificate management, cryptographic protocols, cryptographic service content, providing cryptographic support for the integrity, identity authenticity, data confidentiality of the trusted computing platform itself. 3.4 Root of trust for measurement A trusted integrity measurement unit, which is the basis for trusted measurement within a trusted computing platform. Note. The root of trust for measurement is implemented or composed of hardware, firmware, software, etc. 3.5 SRTM. Static Root of Trust Measurement TBB. Trusted Building Block TCB. Trusted Computing Base TCM. Trusted Cryptography Module TSM. TCM Service Module UEFI. Unified Extensible Firmware Interface

5 Overview of trusted computing cryptographic support

platform 5.1 Trusted computing Trusted computing is a comprehensive information security technology, which is designed to enhance the trustworthiness of computer systems. Trusted technology establishes a trusted root in a computer system, starting from the trusted root to the hardware platform, to the operating system, then to the application, measures, authenticates, trusts step by step, extending this trust to the entire computer system, taking protective measures to ensure the integrity of computing resources and the predictability of computing behavior, thereby improving the trustworthiness of the computer system. 5.2 Trusted components A trusted component consists of one or a group of components that can complete the instantiation of a trusted root. 5.3 Trusted computing base The trusted computing base (TCB) is the system hardware and software resources responsible for maintaining the system security policy. An important attribute of the TCB is that it shall prevent itself from being damaged by any hardware or software that does not belong to the TCB. 5.4 Trusted boundary The trusted component (TBB) and the trusted root constitute the trusted boundary, which includes entities that measure, store, and report the integrity of the computer's minimum configuration. In more complex systems, trust shall be extended to other code by measuring other code based on the Core root of trust for measurement (CRTM) and recording the measurement results in the Platform Configuration Register (PCR). 5.5 Trusted Transfer Trusted transfer is the process of measuring the measured modules one by one based on the Trusted Root and extending the trust chain. Trusted transfer shall be achieved by TCM supporting one of the following two methods. a) An operation performed in accordance with the security policy to allow subsequent operations to obtain control of the TCB; b) For the measurement of subsequent operations, an independent evaluation of the trust relationship is established. 5.6 Trusted authorization When the root of trust for measurement (RTM) begins to execute the core root of trust for measurement (CRTM), its correctness is guaranteed by the producer of the trusted component. When the system executes code outside the core root of trust for measurement, the trust chain can be maintained by measuring the trust of the code. If the execution of code depends on its trust measurement, the execution authorization of the code will remain unchanged. The following are two different methods that allow the evaluation of the trust rights of the platform. a) Measure the code (hash calculation) and record the measurement value in the root of trust for storage (RTS). If the code does not consider its measurement value when running, its trust authorization comes from the digest value provided by the root of trust for reporting (RTR). b) Sign the code and determine whether the code is trustworthy by verifying the signature. If its identity is recorded in the RTS, then this assessment can be modified.

6 Functions of trusted computing cryptographic support

reports to it. The only interaction between TCM and the system is through the interface defined in this document. 6.1.4 TCM service module The trusted cryptographic module defines a subsystem with storage protection and execution protection, which will establish a trusted root for the computing platform; its independent computing resources will establish a strictly isolated security protection mechanism. The functions that need to be executed and those that do not need to be executed in the subsystem shall be separated; the functions that do not need to be executed shall be executed by the main processor of the computing platform; these supporting functions constitute the TCM service module. Note. This document only describes the functional principle of the TCM service; it does not involve the TCM service module interface specification. The TCM service module interface specification can be found in GM/T 0058. The TCM service mainly provides support for users to use TCM basic resources. It consists of multiple parts; the interface definition between each part shall be interoperable. The TCM service shall provide a standardized function interface. The design goals of the TCM service are as follows. a) Provide an entry point for applications to call TCM security protection functions; b) Provide synchronous access to TCM; c) Hide the complexity of TCM function commands from applications; d) Manage TCM resources. 6.2 Platform interface functions 6.2.1 Trusted root The trusted root is the trusted base point of the trusted computer and the base point for implementing security controls. The trusted root provides the minimum functions required to describe the characteristics of the platform's trustworthiness. There are three trusted roots in the trusted computing cryptographic support platform. the root of trust for measurement (RTM), the root of trust for storage (RTS), the root of trust for reporting (RTR). a) RTM is the base point for trusted measurement of the platform. RTM sends integrity information to RTS. When a new trust chain is established, the first set of instructions executed is the core root of trust for measurement (CRTM). When the system is reset, the CPU starts executing CRTM. Then, CRTM sends a measurement value indicating its identity to RTS. This establishes the starting point of the trust chain. b) RTS is the base point for secure storage of trusted measurement values. TCM internal storage cannot be unauthorizedly accessed by external entities; TCM can serve as RTS. TCM can prevent unauthorized access to sensitive information; TCM can also store some non-sensitive information. c) RTR is the base point for the platform to provide platform credibility status reports to access objects. RTR reports on RTS content; RTR reports are signed reports of selected content in TCM. TCM contains an encrypted identity that can be verified by RTR. This identity is expressed in the form of an endorsement key or an endorsement certificate. The seed generated by the endorsement key is bound to each chip, so two TCMs will not have the same endorsement key. The trusted computing platform provides at least three trusted roots described above. RTM, RTS, RTR. All three roots use authentication and proof to provide evidence of information. The trusted computing platform will also provide protected storage for trusted keys and data objects. The trusted computing platform can provide integrity measurements to ensure the trustworthiness of the platform. 6.2.2 Attestation and certification 6.2.2.1 Attestation methods 6.2.2.1.1 Classification The trusted computing platform provides the following attestation methods. a) In the first category, an external entity attests to the TCM, which shall comply with this document. This attestation is based on the endorsement key in the TCM. b) In the second category, an external entity authenticates the platform to ensure that the platform contains the RTM, the authentic TCM. c) In the third category, the "certifying CA" attests to the asymmetric key pair in the TCM, to ensure that the key is protected by the TCM and has specific intrinsic properties. This attestation takes the form of a certificate, to provide guarantees for information including the public key of the key pair. d) In the fourth category, the trusted computing platform attests to the asymmetric key pair, to ensure that the key pair is protected by the TCM and has specific intrinsic properties. This authentication method takes the form of signing the information describing the key pair in the platform's TCM, using the authentication key protected by the TCM, and a type authentication that provides a guarantee for the authentication key. e) Category 5, the trusted computing platform attests the measurement to ensure that a specific software/firmware state exists in the platform. This attestation method uses the authentication key protected by the TCM, to sign the software/firmware measurement value in the PCR. f) Category 6, the external entity attests the software/firmware measurement. This authentication takes the form of a credential that signs the information including the measurement value and state. 6.2.2.1.2 Attestation key and attestation key identity certificate The authentication of categories 3 and 4 above requires the use of a key to sign the content of the TCM shielded location. a) Attestation key (AK) is the platform identity key. The AK is a special type of signing key, whose use is restricted to prevent forgery (the signature of external data has the same format as the real authentication data). When the TCM is to create a signed message, a special value is used from within the TCM as the message header. When using AK to sign a digest, the caller provides a ticket so that TCM shall determine that the message used to create the digest cannot be forged TCM authentication data. The value signed by AK can be guaranteed to reflect the TCM state, but AK can also be used for general signing purposes. b) Proof of key identity certificate. TCM users can create limited-use signing keys based on TCM and require a third-party CA to provide them with a key identity certificate. The CA can require the caller to provide some evidence to prove that the authenticated key is a TCM resident key, before providing an identity certificate. 6.2.2.2 Platform identity The trusted computing cryptographic support platform uses an endorsement key (EK) to identify its identity. Under the authorization of EK, an asymmetric key pair is generated inside TCM as AK, which is used to digitally sign information inside TCM, realize platform identity authentication and platform integrity report, thus proving the credibility of the platform's internal data to the outside. EK shall be stored in TCM and used only when obtaining endorsement key authorization operations and applying for platform identity certificates; it shall not be exported outside TCM. The endorsement key certificate is signed by a trusted party before the platform is used to establish a one-to-one correspondence between EK and trusted cryptographic module instances. A trusted computing cryptographic support platform can generate multiple AKs, each of which is bound to EK and represents the platform identity to the outside world. 6.2.3 Protected locations 6.2.3.1 Overview The protected location uses multiple seeds and keys for encryption, which never leave the TCM. One of them is the context key. It is a symmetric key used to encrypt data when it is temporarily exchanged out of the TCM, in order to load a different set of working objects. Other sensitive values that never leave the TCM are primary seeds, which are the roots of the storage hierarchy that protects objects retained by the application. The primary seed is used to generate random numbers for protection keys for other objects. these objects may be storage keys containing protection keys. The primary seeds may be changed; when they are changed, the objects derived from them will no longer be available. 6.2.3.2 Key management functions Key management includes the following functions. a) Key generation. Key generation refers to the application layer software setting the key attributes, key use authorization, key migration authorization, key protection operation key of the required generated key, sending them to the TCM to generate the specified key. In the TCM, the private key part of the generated key is encrypted by the protection operation key, then the generated key data structure is returned to the application layer software. For various types of keys in the TCM, the generation methods include. ● EK is generated by the manufacturer and is an asymmetric key; ● When the platform owner generates the storage master key, it shall be generated inside the trusted cryptographic module; ● The platform identity key is an asymmetric key and shall be generated inside the TCM. The trusted party shall apply for the corresponding platform identity certificate and activate the key; ● The user key can be generated inside the trusted cryptographic module or imported after being generated outside the trusted cryptographic module. The user key can be a symmetric key or an asymmetric key. b) Key loading. After the key is generated, when the application layer software uses the key for data security protection operations, if the private key of the key is used, the key data shall be loaded into the TCM and can only be used after being decrypted by the protection operation key. If the public key of the key is used, it can be used directly in the application layer software. The loading methods of various keys in the trusted cryptographic module include. ● When using the TCM key public key, the authorization shall not be verified before setting the platform owner. After setting the platform owner, the owner authorization shall be verified; the cryptographic algorithm operation process shall be performed inside the TCM; ● When using the storage master key, the storage master key authorization shall be verified; the cryptographic algorithm operation process shall be performed inside the TCM; ● When using the platform identity key AK, the platform identity key authorization and storage master key authorization shall be verified; the private key of the platform identity key shall be loaded into the TCM for cryptographic algorithm operation; the cryptographic algorithm operation process of the public key shall be performed outside the TCM; ● When using the platform encryption key, the platform encryption key authorization and storage master key authorization shall be verified; the private key of the platform encryption key shall be loaded into the trusted cryptographic module for cryptographic operation; the cryptographic operation process of the public key shall be performed outside the module; ● When using the user key, the user key authorization shall be verified; the private key of the user key shall be loaded into the TCM for cryptographic operation. c) Key destruction. After the key is generated, the application layer software can destroy the specified key. For various keys in TCM, the destruction method is as follows. ● Destroying EK is completed by revoking revocable EK. Irrevocable EK cannot be destroyed; ● Destroying the storage master key shall verify the storage master key authorization before executing it in TCM; ● Destroying the platform identity key shall verify the platform identity key authorization and storage master key authorization, before executing it in the trusted cryptographic module; ● Destroying the platform encryption key shall verify the platform encryption key authorization and storage master key authorization, before executing it in the trusted cryptographic module; ● Destroying the user key needs to verify its protection operation key authorization, before executing it in the TCM service module. After the integrity measurement value storage operation of the last component is completed, the value obtained is the integrity measurement value of the component sequence stored in the PCR. 6.2.4.3 Integrity report Integrity report refers to the process of the platform providing the integrity measurement value of the platform or some components to the verifier. The integrity report shall meet the following requirements. a) The platform shall provide the verifier with the specified PCR value without any authorization; b) The platform shall provide the verifier with the specified PCR value and the signature of the PCR value; the signature shall use the platform identity key; c) The platform can provide the verifier with the associated event log information of the specified PCR; d) The verifier can determine whether the PCR value comes from the correct measurement process, by analyzing the integrity measurement event log information; e) The verifier shall use the platform identity key to verify the PCR value signature and obtain the platform integrity report result. 6.2.4.4 Trust chain The trust chain is used to ensure the integrity of the platform. The establishment of the platform trust chain starts with the root of trust for measurement. First, measure the integrity of other components of BIOS; store the measurement values in the PCR of the trusted cryptographic module. According to the selected judgment mechanism, judge the integrity of BIOS. If the integrity is not damaged, run BIOS; measure the integrity of the initialization program loader (IPL)/master boot record (MBR). The integrity of IPL/MBR can also be judged, based on the judgment mechanism. If the integrity of IPL/MBR is not damaged, run MBR; then measure the integrity of OS kernel by IPL/MBR; after OS kernel is started, detect the integrity of OS service based on the same mechanism. Through the transmission of trust relationship, it can be ensured that the started system is trustworthy. If the integrity of a component is found to be damaged in the above process, report the problem and perform operations according to the specified policy. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0011-2023 be delivered?

Answer: The full copy PDF of English version of GM/T 0011-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0011-2023_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0011-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0011-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

Question 5: Should I purchase the latest version GM/T 0011-2023?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0011-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

How to buy and download a true PDF of English version of GM/T 0011-2023?

A step-by-step guide to download PDF of GM/T 0011-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0011-2023".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9