HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189759 (8 Jun 2025)

PDF GM/T 0042-2015 English


Search result: GM/T 0042-2015
Standard IDContents [version]USDSTEP2[PDF] delivered inName of Chinese StandardStatus
GM/T 0042-2015English560 Add to Cart 0-9 seconds. Auto-delivery. Test specification for cryptography and security protocol in tri-element peer architecture Valid

PDF Preview: GM/T 0042-2015                   
      

GM/T 0042-2015: PDF in English (GMT 0042-2015)

GM/T 0042-2015 GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 File No.. 49741-2015 Test specification for cryptography and security protocol in tri-element peer architecture ISSUED ON. APRIL 01, 2015 IMPLEMENTED ON. APRIL 01, 2015 Issued by. State Cryptography Administration Table of Contents Foreword ... 4 Introduction .. 5 1 Scope .. 6 2 Normative references ... 6 3 Terms and definitions ... 7 4 Symbols and abbreviations ... 8 5 Basic technical requirements ... 9 5.1 Correctness and consistency requirements of cryptographic algorithm implementation .. 9 5.2 Conformity and interoperability requirements for protocol implementation ... 10 5.3 Other requirements .. 11 6 Test environment requirements ... 11 6.1 Test equipment .. 11 6.2 Test topology... 12 7 Unified sealing of cryptography and security protocol test in tri-element peer architecture ... 14 7.1 Definition of unified sealing data structure ... 14 7.2 Definitions of unified sealing data element ... 16 8 Test method of cryptographic algorithm implementation correctness and consistency ... 17 8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency ... 17 8.2 Test methods of digital signature algorithm implementation correctness and consistency .. 17 8.3 Test methods of key exchange protocol implementation correctness and consistency .. 18 8.4 Test methods of public key encryption algorithm implementation correctness and consistency... 18 8.5 Test methods of digital certificate format ... 19 8.6 Test methods of cryptographic hash algorithm ... 19 8.7 Test methods of random number ... 20 9 Test methods for protocol implementation consistency and interoperability ... 20 9.1 Port control test method... 20 9.2 TAEP protocol sealing test method ... 21 9.3 TAEPoL protocol sealing test method .. 22 9.4 TCP/UDP port test method ... 22 Appendix A (Informative) TAEP protocol sealing Request and Response group Type definition ... 23 Appendix B (Normative) Unified sealing data element of cryptography and security protocol test in tri-element peer architecture .. 25 Appendix C (Normative) Equipment naming ... 36 Appendix D (Informative) Test vector ... 38 Foreword This Standard was drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights. This Standard was proposed by and shall be under the jurisdiction of Cryptography Industry Standardization Technical Committee. Main drafting organizations of this Standard. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory on Wireless Network Security Technology, State Cryptography Administration Commercial Password Detection Center, National Wireless Monitoring Center Detection Center, China Telecom Corporation, China Aerospace Science and Industry Corporation 2nd Institute 706 office, China Electronics Technology Group Corporation 15th Institute, National Information Center, China PLA General Political Department 61st Institute, Beijing Municipal Affairs Network Management Center, WAPI Industry Alliance, Guangzhou Jiesai Technology Co., Ltd., Shenzhen Minghua Aohan Technology Co., Ltd., Ministry of Public Security Information Security Rating Protection Evaluation Center, Beijing CECT Huada Electronic Design Co., Ltd. Main drafters of this Standard. Cao Jun, Li Qin, Huang Zhenhai, Li Dawei, Deng Kaiyong, Hu Ya’nan, Song Qizhu, Gao Bo, Kong Lei, Luo Peng, Li Guoyou, Li Guang, Wu Yafei, Yang Lin, Li Yanchun, Qin Zhiqiang, Zhou Tao, Zhu Zhengmei, Yao Rui, Zhan Baorong, Shen Yuchao, Pan Qi, Shi Qianjun, Du Zhiqiang, Yan Xiang, Wang Yuehui, Zhang Bianling, Tie Manxia, Zhang Qiang, Zhang Guoqiang, Li Ming, Zhang Sha, Ding Qifeng, Liu Hu, Yang Feng, Huang Li, Pan Yiming, Tong Weigang, Wang Lei, and so on. Test specification for cryptography and security protocol in tri-element peer architecture 1 Scope This standard specifies the basic technical requirements of the tri-element peer architecture cryptography security protocol for the relevant cryptography algorithm and security protocol as well as the corresponding test methods, it is applicable to the detection of tri-element peer cryptography security protocol- related products. It mainly includes the following contents. a) Technical requirements and test methods for the correctness and consistency of cryptography algorithm implementation; b) Basic technical requirements and test methods for compliance and interoperability of the protocol implementation. This standard applies to the equipment complying with ISO/IEC 9798- 3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect whether its cryptography algorithm and protocol implementation comply with the requirements of the above standards. 2 Normative references The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 15843.3 Information technology - Security techniques - Entity authentication - Part 3. Mechanisms using digital signature techniques GB/T 28455-2012 Information security technology - Entity authentication involving a trusted third party and access architecture specification GM/T 0002 SM4 block cipher algorithm GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves GM/T 0004 SM3 password hashing algorithm GM/T 0005 Randomness test specification successfully completed, both systems allow the other party to access the services provided by their controlled port. 5.2.2 TAEP protocol sealing requirements The data sealing of the authentication protocol in the cryptography and security protocol in tri-element peer architecture shall meet the sealing requirements of the TAEP protocol defined in GB/T 28455-2012. The Type field in the TAEP Request and Response grouping formats is used to indicate the type of the Request and Response groups. See Appendix A for definition. 5.2.3 TAEP sealing (TAEPol) protocol requirements on the link GB/T 28455-2012 defines sealing techniques for the loading TAEP groups between requester PAE and authentication access controller PAE. The sealing indicates the TAEP on the link as the TAEPoL. The TAEPoL protocol uses the 0x891b Ether type field. 5.2.4 Underlay and transport layer protocol sealing requirements The TAEP message is transmitted between the authentication access controller and the authentication server using the TAEP-AS-SVC service protocol specified in GB/T 28455-2012. The authentication server receives the TAEP message on the UDP/TCP port 5111 as the server end and authentication access controller sends the TAEP message as a client. 5.3 Other requirements Products need to consider self-test, and the product reliability and stability shall meet the specific scenario requirements of the product application. In accordance with the implementation of the protocol in the product, it may provide algorithm implementation correctness and random number self-test descriptions. The security requirements of the cryptographic module in the product shall meet GM/T 0028. 6 Test environment requirements 6.1 Test equipment The test equipment shall be subject to metrological verification, and within the 8 Test method of cryptographic algorithm implementation correctness and consistency 8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency The test method is as follows. a) Set up a test network to perform the interactions of cryptography and security protocol in tri-element peer architecture among the tested equipment, standard equipment and support equipment; b) The tested equipment and the support equipment seal the relevant data concerning the symmetric cryptographic algorithm in the interaction information as received and sent in the interaction process of the cryptography and security protocol in tri-element peer architecture as well as the known relevant data in accordance with the unified sealing requirements of the cryptography and security protocol test in tri-element peer architecture as defined in 7.1, and submit it to the test platform; c) The test platform parses it to get the data field related to the symmetric cryptographic algorithm test, uses these data fields to perform the correctness and consistency test of the symmet... ......
 
Source: Above contents are excerpted from the PDF -- translated/reviewed by: www.chinesestandard.net / Wayne Zheng et al.