GM/T 0040-2024 (GM/T 0040-2015) PDF English
US$150.00 · In stock · Download in 9 secondsGM/T 0040-2015: Cipher test specification of radio frequency identification tag module Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid GM/T 0040: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0040-2024 | English | 489 |
Add to Cart
|
4 days
|
(RFID tag module password detection specification)
| Valid |
GM/T 0040-2015 | English | 150 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cipher test specification of radio frequency identification tag module
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0040-2015
GM/T 0040-2015: Cipher test specification of radio frequency identification tag module---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0040-2015
GM
CRYPTOGRAPHY INDUSTRY STANDARD
ICS 35.040
L80
File No.. 49739-2015
Cipher test specification of radio
frequency identification tag module
Issued on: APRIL 1, 2015
Implemented on: APRIL 1, 2015
Issued by. State Cryptography Administration
Table of Contents
Foreword... 3
1 Scope.. 4
2 Normative references... 4
3 Terms and definitions... 5
4 Symbols and abbreviations... 6
5 RFID tag module classification... 6
5.1 Category-I tag module.. 6
5.2 Category-II tag module... 6
6 Test requirements... 7
6.1 General requirements... 7
6.2 Cryptographic algorithm.. 7
6.3 Cryptography service... 10
6.4 Cipher performance... 14
6.5 Sensitive information protection.. 14
6.6 Non-repudiation... 15
6.7 Life-cycle security... 16
6.8 Audit... 18
6.9 Key management... 18
6.10 Development environment protection... 19
Appendix A (Normative) Cipher test items of radio frequency identification tag
module... 22
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this Standard
may be the subject of patent rights. The issuing authority shall not be held
responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of
Cryptography Industry Standardization Technical Committee.
Main drafting organizations of this Standard. CEC Huada Electronic Design Co.,
Ltd., Commercial Cryptography Testing Center of State Cryptography
Administration, Shanghai Huahong Integrated Circuit Co., Ltd., Beijing
Tongfang Microelectronics Company, Shanghai Fudan Microelectronics Group
Co., Ltd., Shanghai Hsic Application System Co., Ltd., Aisino Corporation,
Nation Technologies Inc.
Main drafters of this Standard. Dong Haoran, Luo Peng, Zhou Jiansuo, Lan
Tian, Fei Du, Mao Yingying, Mo Fan, Deng Kaiyong, Gu Zhen, Yang Xianwei,
Shao Bo, Liu Xun, Liu Ying, Yue Chao.
Cipher test specification of radio
frequency identification tag module
1 Scope
This standard specifies the test content and requirements for cipher test of RFID
(Radio Frequency Identification) tag module product by using cryptographic
techniques.
This standard applies to cipher test and security function test of RFID tag
module. It can also be used to meet the requirements of GB/T 28925-2012 and
GB/T 29768-2013 for the cipher test of RFID air interface protocol product.
The algorithm described in this standard is the cryptographic algorithm which is
approved by state cryptography administration competent department.
2 Normative references
The following documents are essential for the application of this document. For
dated references, only the dated version applies to this document. For undated
references, the latest edition (including all amendments) applies to this
document.
GB/T 28925-2012 Information technology - Radio frequency identification -
Air interface protocol at 2.45 GHz
GB/T 29768-2013 Information technology - Radio frequency identification -
Air interface protocol at 800/900 MHz
GM/T 0005-2012 Randomized test specification
GM/T 0008-2012 Cipher test specification of security chip
GM/T 0035.1-2014 Technical requirements for cryptographic application of
radio frequency identification system – Part 1.Cryptographic security
protection framework and security level
GM/T 0035.2-2014 Technical requirements for cryptographic application of
radio frequency identification system - Part 2.Technical requirements for
cryptographic applications of electronic tag chip
GM/T 0035.4-2014 Technical requirements for cryptographic application of
radio frequency identification system - Part 4.Technical requirements for
cryptographic application of electronic tag and reader-writer communication
GM/Z 4001 Cipher terms
3 Terms and definitions
The terms defined in GM/Z 4001 AND the following terms and definitions apply
to this document.
3.1
Symmetric cryptographic algorithm
It is a cryptographic algorithm which uses the same key in encryption-
decryption.
3.2
Unidirectional authentication
It is an identity authentication for tag which is initiated by reader-writer.
3.3
Confidentiality
It is the nature which guarantees information not to be leaked to entities such
as unauthorized individuals and processes.
3.4
Non-repudiation of origin
It is a cryptographic method which is used to prevent the originator of a
message from denying its creation and having sent the message.
3.5
Kill
It is an operation instruction to tag module; after successfully executed, the tag
module will no longer respond to any command.
3.6
Radio frequency identification
command and mechanism specified in the standard; if it selects and uses the
products of security authentication protocols in GM/T 0035.4-2014, it shall
implement the security mechanism specified in the standard; If it selects and
uses the products of security authentication protocols in other security
standards or user-defined, it shall implement the corresponding security
mechanism.
6.3.1.2 Category-I tag module
The identity authentication test mode of Category-I tag module is as follows.
a) Test requirements
Use unidirectional authentication mode. The unidirectional authentication
process shall use cipher, and its cipher function shall be correct and valid.
The test environment needs to design valid and invalid test cases. The tag
module shall respond correctly to the authentication request which is
issued by the reader-writer.
b) Decision criteria
The unidirectional authentication mechanism of tag module is valid.
6.3.1.3 Category-II tag module
The identity authentication test mode of Category-II tag module is as follows.
a) Test requirements
Use bidirectional authentication mode. The bidirectional authentication
process shall use cipher, and its cipher function shall be correct and valid.
The test environment needs to design valid and invalid test cases. The tag
module shall respond correctly to the bidirectional authentication between
the reader-writer.
b) Decision criteria
The bidirectional authentication mechanism of tag module is valid.
6.3.2 Data-transmission confidentiality test
6.3.2.1 Category-I tag module
No requirement.
6.3.2.2 Category II-A tag module
No requirement.
The tag module can use cryptographic algorithm to protect the
confidentiality of the stored sensitive information data.
6.3.4 Data-transmission integrity test (This item is optional)
6.3.4.1 Category-I tag module
No requirement.
6.3.4.2 Category II-A tag module
No requirement.
6.3.4.3 Category II-B tag module
The data-transmission integrity test mode of Category II-B tag module is as
follows.
a) Test requirements
The tag module can provide correct and effective data-transmission
integrity service for sensitive information that is allowed to be transmitted
as required.
When the tag module communicates with the reader-writer, the tag
module uses cryptographic algorithm to perform verification calculation on
the transmitted data to find out that the data has been tampered with,
deleted and inserted, etc., in order to achieve data integrity requirements
during transmission.
b) Decision criteria
The data which is transmitted on the channel can use cryptographic
algorithm for integrity protection during transmission.
6.3.5 Data-storage integrity test (This item is optional)
6.3.5.1 Category-I tag module
No requirement.
6.3.5.2 Category II-A tag module
No requirement.
6.3.5.3 Category II-B tag module
The data-storage integrity test mode of Category II-B tag module is as follows
Send the undefined or incorrect instructions of products to the tested tag
module; the tag module shall report errors or produce no response.
6.7.2.2 Category-II tag module
It is the same as Category-I tag module.
6.7.3 Anti-initial right of use deception test
6.7.3.1 Category-I tag module
The anti-initial right of use deception test mode of Category-I tag module is as
follows.
a) Test requirements
The tag module does not provide initialization permission; perform
initialization operation for the tested tag module; test whether the tag
module has the anti-initialization function.
b) Decision criteria
Do not perform initialization operation on the tested tag module.
6.7.3.2 Category-II tag module
It is the same as Category-I tag module.
6.7.4 Anti-life-cycle cross-border test
6.7.4.1 Category-I tag module
Anti-life-cycle cross-border test mode of Category-I tag module is as follows.
a) Test requirements
Use non-current instructions of life-cycle phase; test the anti-life-cycle
cross-border function of tag module.
b) Deci...
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
|