HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0042-2015 PDF English

US$560.00 · In stock · Download in 9 seconds
GM/T 0042-2015: Test specification for cryptography and security protocol in tri-element peer architecture
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0042-2015English560 Add to Cart 0-9 seconds. Auto-delivery Test specification for cryptography and security protocol in tri-element peer architecture Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0042-2015
      

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0033   

GM/T 0042-2015: Test specification for cryptography and security protocol in tri-element peer architecture


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0042-2015
GM CRYPTOGRAPHY INDUSTRY STANDARD ICS 35.040 L 80 File No.. 49741-2015 Test specification for cryptography and security protocol in tri-element peer architecture Issued on. APRIL 01, 2015 Implemented on. APRIL 01, 2015 Issued by. State Cryptography Administration

Table of Contents

Foreword... 4 Introduction... 5 1 Scope... 6 2 Normative references... 6 3 Terms and definitions... 7 4 Symbols and abbreviations... 8 5 Basic technical requirements... 9 5.1 Correctness and consistency requirements of cryptographic algorithm implementation... 9 5.2 Conformity and interoperability requirements for protocol implementation... 10 5.3 Other requirements... 11 6 Test environment requirements... 11 6.1 Test equipment... 11 6.2 Test topology... 12 7 Unified sealing of cryptography and security protocol test in tri-element peer architecture... 14 7.1 Definition of unified sealing data structure... 14 7.2 Definitions of unified sealing data element... 16 8 Test method of cryptographic algorithm implementation correctness and consistency... 17 8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency... 17 8.2 Test methods of digital signature algorithm implementation correctness and consistency... 17 8.3 Test methods of key exchange protocol implementation correctness and consistency... 18 8.4 Test methods of public key encryption algorithm implementation correctness and consistency... 18 8.5 Test methods of digital certificate format... 19 8.6 Test methods of cryptographic hash algorithm... 19 8.7 Test methods of random number... 20 9 Test methods for protocol implementation consistency and interoperability ... 20 9.1 Port control test method... 20 9.2 TAEP protocol sealing test method... 21 9.3 TAEPoL protocol sealing test method... 22 9.4 TCP/UDP port test method... 22 Appendix A (Informative) TAEP protocol sealing Request and Response group Type definition... 23 Appendix B (Normative) Unified sealing data element of cryptography and security protocol test in tri-element peer architecture... 25 Appendix C (Normative) Equipment naming... 36 Appendix D (Informative) Test vector... 38

1 Scope

This standard specifies the basic technical requirements of the tri-element peer architecture cryptography security protocol for the relevant cryptography algorithm and security protocol as well as the corresponding test methods, it is applicable to the detection of tri-element peer cryptography security protocol- related products. It mainly includes the following contents. a) Technical requirements and test methods for the correctness and consistency of cryptography algorithm implementation; b) Basic technical requirements and test methods for compliance and interoperability of the protocol implementation. This standard applies to the equipment complying with ISO/IEC 9798- 3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect whether its cryptography algorithm and protocol implementation comply with the requirements of the above standards.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 15843.3 Information technology - Security techniques - Entity authentication - Part 3.Mechanisms using digital signature techniques GB/T 28455-2012 Information security technology - Entity authentication involving a trusted third party and access architecture specification GM/T 0002 SM4 block cipher algorithm GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves GM/T 0004 SM3 password hashing algorithm GM/T 0005 Randomness test specification

3 Terms and definitions

The terms and definitions as defined in GM/Z 4001 and GB/T 28455-2012 as well as the following terms and definitions apply to this document. 3.1 Tested equipment An equipment that implements a tri-element peer cryptography security protocol. 3.2 Test platform A platform for the tri-element peer cryptography security protocol test, it is used to collect and analyze the test data, judge the test data in accordance with the requirements of the test specifications, and present and record the judgement results. 3.3 Access control A mechanism that allows or denies user access to resources in accordance with specific policies. 3.4 Support equipment A special standard equipment which, in addition to interacting with cryptography and security protocol in tri-element peer architectures, also requires proactive provision of data for assistance test to the test platform. 3.5 Standard equipment The equipment which needs to be used synchronously when testing the tested equipment AND works together with the tested equipment to implement the cryptography and security protocol in tri-element peer architecture interacting process. The standard equipment is an equipment complying with the cryptography and security protocol in tri-element peer architecture.

4 Symbols and abbreviations

The abbreviations as defined in GM/Z 4001 and GB/T 28455-2012 and the following abbreviations apply to this document. AAC. Authentication Access Controller

5 Basic technical requirements

5.1 Correctness and consistency requirements of cryptographic algorithm implementation The cryptography and security protocol test in tri-element peer architecture shall provide input and output for cryptographic algorithm testing in accordance with the requirements of the national cryptographic industry standard. 5.2 Conformity and interoperability requirements for protocol implementation 5.2.1 Port control requirements The port access control mechanism in the tri-element peer cryptographic security protocol product shall comply with the provisions of GB/T 28455-2012. In GB/T 28455-2012, it requires the port access entity (PAE) to make operation for the authentication access control protocol. For the system that supports the port access control functions, each port has a PAE, regardless of whether the system plays the role of a requestor or authentication access controller role. In the authentication interaction, the requester PAE and the authentication access controller PAE control the authorized/unauthorized status of the controlled port in accordance with the result of the authentication process. 5.2.4 Underlay and transport layer protocol sealing requirements The TAEP message is transmitted between the authentication access controller and the authentication server using the TAEP-AS-SVC service protocol specified in GB/T 28455-2012.The authentication server receives the TAEP message on the UDP/TCP port 5111 as the server end and authentication access controller sends the TAEP message as a client. 5.3 Other requirements Products need to consider self-test, and the product reliability and stability shall meet the specific scenario requirements of the product application.

6 Test environment requirements

6.1 Test equipment The test equipment shall be subject to metrological verification, and within the period of validity of the verification, the accuracy of the test equipment shall meet the measurement requirements. 6.2 Test topology 6.2.1 Overview The protocol entity involved in the cryptography and security protocol in tri- element peer architecture includes the requester REQ, the authentication access controller AAC, and the authentication server AS. 6.2.2 REQ test topology In the test topology for REQ, the tested equipment is REQ, the standard equipment is AAC, and the support equipment is AS. 6.2.3 AAC test topology For the AAC test topology, the tested equipment is AAC, the standard equipment is REQ, the support equipment is AS.

7 Unified sealing of cryptography and security

protocol test in tri-element peer architecture 7.1 Definition of unified sealing data structure Support equipment and tested equipment shall, in accordance with the unified sealing structure of the cryptography and security protocol test in tri-element peer architecture, seal the original message and provide it to the test platform. 7.2 Definitions of unified sealing data element The data elements in the data fields in the unified data sealing are sealed in TLV format, as shown in Figure 5.

8 Test method of cryptographic algorithm implementation correctness and consistency

8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency The test method is as follows. a) Set up a test network to perform the interactions of cryptography and 8.2 Test methods of digital signature algorithm implementation correctness and consistency The test method is as follows. 8.3 Test methods of key exchange protocol implementation correctness and consistency The test method is as follows. 8.5 Test methods of digital certificate format The test method is as follows. 8.6 Test methods of cryptographic hash algorithm The test method is as follows. 8.7 Test methods of random number The test method is as follows. 9 Test methods for protocol implementation consistency and interoperability 9.1 Port control test method This test is for REQ and AAC. When the tested equipment is a REQ, the test topology is as shown in 6.2.2. The standard equipment AAC and the support equipment AS are required to perform the test. 9.3 TAEPoL protocol sealing test method This test is for REQ and AAC. 9.4 TCP/UDP port test method This test is for AAC and AS. When the tested equipment is AAC, the standard equipment REQ and the support equipment AS are required to perform test. GM/T 0042-2015 GM CRYPTOGRAPHY INDUSTRY STANDARD ICS 35.040 L 80 File No.. 49741-2015 Test specification for cryptography and security protocol in tri-element peer architecture Issued on. APRIL 01, 2015 Implemented on. APRIL 01, 2015 Issued by. State Cryptography Administration

Table of Contents

Foreword... 4 Introduction... 5 1 Scope... 6 2 Normative references... 6 3 Terms and definitions... 7 4 Symbols and abbreviations... 8 5 Basic technical requirements... 9 5.1 Correctness and consistency requirements of cryptographic algorithm implementation... 9 5.2 Conformity and interoperability requirements for protocol implementation... 10 5.3 Other requirements... 11 6 Test environment requirements... 11 6.1 Test equipment... 11 6.2 Test topology... 12 7 Unified sealing of cryptography and security protocol test in tri-element peer architecture... 14 7.1 Definition of unified sealing data structure... 14 7.2 Definitions of unified sealing data element... 16 8 Test method of cryptographic algorithm implementation correctness and consistency... 17 8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency... 17 8.2 Test methods of digital signature algorithm implementation correctness and consistency... 17 8.3 Test methods of key exchange protocol implementation correctness and consistency... 18 8.4 Test methods of public key encryption algorithm implementation correctness and consistency... 18 8.5 Test methods of digital certificate format... 19 8.6 Test methods of cryptographic hash algorithm... 19 8.7 Test methods of random number... 20 9 Test methods for protocol implementation consistency and interoperability ... 20 9.1 Port control test method... 20 9.2 TAEP protocol sealing test method... 21 9.3 TAEPoL protocol sealing test method... 22 9.4 TCP/UDP port test method... 22 Appendix A (Informative) TAEP protocol sealing Request and Response group Type definition... 23 Appendix B (Normative) Unified sealing data element of cryptography and security protocol test in tri-element peer architecture... 25 Appendix C (Normative) Equipment naming... 36 Appendix D (Informative) Test vector... 38

1 Scope

This standard specifies the basic technical requirements of the tri-element peer architecture cryptography security protocol for the relevant cryptography algorithm and security protocol as well as the corresponding test methods, it is applicable to the detection of tri-element peer cryptography security protocol- related products. It mainly includes the following contents. a) Technical requirements and test methods for the correctness and consistency of cryptography algorithm implementation; b) Basic technical requirements and test methods for compliance and interoperability of the protocol implementation. This standard applies to the equipment complying with ISO/IEC 9798- 3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect whether its cryptography algorithm and protocol implementation comply with the requirements of the above standards.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 15843.3 Information technology - Security techniques - Entity authentication - Part 3.Mechanisms using digital signature techniques GB/T 28455-2012 Information security technology - Entity authentication involving a trusted third party and access architecture specification GM/T 0002 SM4 block cipher algorithm GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves GM/T 0004 SM3 password hashing algorithm GM/T 0005 Randomness test specification

3 Terms and definitions

The terms and definitions as defined in GM/Z 4001 and GB/T 28455-2012 as well as the following terms and definitions apply to this document. 3.1 Tested equipment An equipment that implements a tri-element peer cryptography security protocol. 3.2 Test platform A platform for the tri-element peer cryptography security protocol test, it is used to collect and analyze the test data, judge the test data in accordance with the requirements of the test specifications, and present and record the judgement results. 3.3 Access control A mechanism that allows or denies user access to resources in accordance with specific policies. 3.4 Support equipment A special standard equipment which, in addition to interacting with cryptography and security protocol in tri-element peer architectures, also requires proactive provision of data for assistance test to the test platform. 3.5 Standard equipment The equipment which needs to be used synchronously when testing the tested equipment AND works together with the tested equipment to implement the cryptography and security protocol in tri-element peer architecture interacting process. The standard equipment is an equipment complying with the cryptography and security protocol in tri-element peer architecture.

4 Symbols and abbreviations

The abbreviations as defined in GM/Z 4001 and GB/T 28455-2012 and the following abbreviations apply to this document. AAC. Authentication Access Controller

5 Basic technical requirements

5.1 Correctness and consistency requirements of cryptographic algorithm implementation The cryptography and security protocol test in tri-element peer architecture shall provide input and output for cryptographic algorithm testing in accordance with the requirements of the national cryptographic industry standard. 5.2 Conformity and interoperability requirements for protocol implementation 5.2.1 Port control requirements The port access control mechanism in the tri-element peer cryptographic security protocol product shall comply with the provisions of GB/T 28455-2012. In GB/T 28455-2012, it requires the port access entity (PAE) to make operation for the authentication access control protocol. For the system that supports the port access control functions, each port has a PAE, regardless of whether the system plays the role of a requestor or authentication access controller role. In the authentication interaction, the requester PAE and the authentication access controller PAE control the authorized/unauthorized status of the controlled port in accordance with the result of the authentication process. 5.2.4 Underlay and transport layer protocol sealing requirements The TAEP message is transmitted between the authentication access controller and the authentication server using the TAEP-AS-SVC service protocol specified in GB/T 28455-2012.The authentication server receives the TAEP message on the UDP/TCP port 5111 as the server end and authentication access controller sends the TAEP message as a client. 5.3 Other requirements Products need to consider self-test, and the product reliability and stability shall meet the specific scenario requirements of the product application.

6 Test environment requirements

6.1 Test equipment The test equipment shall be subject to metrological verification, and within the period of validity of the verification, the accuracy of the test equipment shall meet the measurement requirements. 6.2 Test topology 6.2.1 Overview The protocol entity involved in the cryptography and security protocol in tri- element peer architecture includes the requester REQ, the authentication access controller AAC, and the authentication server AS. 6.2.2 REQ test topology In the test topology for REQ, the tested equipment is REQ, the standard equipment is AAC, and the support equipment is AS. 6.2.3 AAC test topology For the AAC test topology, the tested equipment is AAC, the standard equipment is REQ, the support equipment is AS.

7 Unified sealing of cryptography and security

protocol test in tri-element peer architecture 7.1 Definition of unified sealing data structure Support equipment and tested equipment shall, in accordance with the unified sealing structure of the cryptography and security protocol test in tri-element peer architecture, seal the original message and provide it to the test platform. 7.2 Definitions of unified sealing data element The data elements in the data fields in the unified data sealing are sealed in TLV format, as shown in Figure 5.

8 Test method of cryptographic algorithm implementation correctness and consistency

8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency The test method is as follows. a) Set up a test network to perform the interactions of cryptography and 8.2 Test methods of digital signature algorithm implementation correctness and consistency The test method is as follows. 8.3 Test methods of key exchange protocol implementation correctness and consistency The test method is as follows. 8.5 Test methods of digital certificate format The test method is as follows. 8.6 Test methods of cryptographic hash algorithm The test method is as follows. 8.7 Test methods of random number The test method is as follows. 9 Test methods for protocol implementation consistency and interoperability 9.1 Port control test method This test is for REQ and AAC. When the tested equipment is a REQ, the test topology is as shown in 6.2.2. The standard equipment AAC and the support equipment AS are required to perform the test. 9.3 TAEPoL protocol sealing test method This test is for REQ and AAC. 9.4 TCP/UDP port test method This test is for AAC and AS. When the tested equipment is AAC, the standard equipment REQ and the support equipment AS are required to perform test. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0042-2015 be delivered?

Answer: The full copy PDF of English version of GM/T 0042-2015 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0042-2015_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0042-2015_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0042-2015 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0042-2015?

A step-by-step guide to download PDF of GM/T 0042-2015_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0042-2015".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9