GM/T 0055-2018 PDF English
US$490.00 · In stock · Download in 9 secondsGM/T 0055-2018: File cryptographic technical specification Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0055-2018 | English | 490 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
File cryptographic technical specification
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0055-2018
GM/T 0055-2018: File cryptographic technical specification---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0055-2018
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
L 80
Registration number. 62990-2018
GB/T 0055-2018
File cryptographic technical specification
Issued on. MAY 02, 2018
Implemented on. MAY 02, 2018
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms and definitions... 6
4 Abbreviations... 8
5 Labeling mechanism... 8
6 Cryptographic algorithm and cryptographic service... 14
7 Labels... 16
8 Basic cryptographic operation... 31
9 Cryptographic service interface of secured file... 34
Appendix A (Informative) Digital watermark... 86
Appendix B (Informative) Fingerprint recognition... 87
1 Scope
This standard neither standardize the security of the application system, nor
specify specific file types.
This standard is applicable to the relevant standard specifications and
applications that focus on the security of file objects. It is also applicable to the
development and testing of the middleware of cryptographic service of security
electronic files, which can be used to guide the development of application
systems using this middleware.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GM/T 0009 SM2 Cryptography algorithm application specification
GM/T 0015 Digital certificate format based on SM2 algorithm
GM/T 0017 Smart token cryptography application interface data format
specification
GM/T 0019 Universal cryptography service interface specification
GM/T 0031 Secure electronic stamp cryptography technical specification
PKCS # 1 RSA Cryptography Standard
PKCS # 5 Password-based Encryption Standard
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Application system
A system that creates, modifies, authorizes, reads, signs, stamps, prints,
adds watermarks, transfers, archives, destructs files using files as objects.
3.2
File
An entity that is represented numerically and that has a specific meaning for
a particular use object. It may be all kinds of official documents, bills, digital
works, etc.
3.3
Label
A digital entity bound to the file, which is used to identify the attributes and
state of the file; define the operation object, operation behavior, access rights
of the file; record the operation behavior of the operator in the file processing
link; ensure that the file is created, modified, authorized, read, signed off,
stamped, printed, watermark added, circulated, archived, destructed in a
safe and controllable state, thereby providing the basis for traceability and
auditing of the application system.
4 Abbreviations
The following abbreviations apply to this document.
API. Application Programming Interface
ASN.1.Abstract Syntax Notation One
CBC. Cipher-book Chain
CFB. Cipher Feedback
5 Labeling mechanism
5.1 Overall description
This standard uses cryptographic techniques to ensure the confidentiality,
integrity, validity, non-repudiation of files;
5.2 System architecture of label-based secured file
The label-based secured file system includes application systems, middleware,
basic cryptographic services, personalized cryptographic services, as shown in
Figure 1.
5.5 Storage method of secured files
5.5.1 Overview of label
The labels are divided into internal type and external type, which use ASN.1
code. According to the length of the label, it is divided into fixed label and non-
fixed label. The fixed label sets a length when the label is created, so that the
label is always equal to this length; the insufficient part is filled with zero, it is
not allowed to exceed the length. The non-fixed label does not limit the length
of the label and can be arbitrarily increased.
5.5.3 External type
In external storage, labels and files are stored in two separate files. The
correspondence between labels and file entities is managed by the application
system, as shown in Figure 3.
5.6 Binding mechanism of label and file
5.6.3 Verification of binding relationship
As shown in Figure 5, the process of verifying the binding relationship between
a label and a file is as follows.
6 Cryptographic algorithm and cryptographic service
6.1 Cryptographic mechanism
The middleware's cryptographic mechanism is based on the PKI system, which
uses a digital certificate mechanism to secure the files. The digital certificate
uses a dual digital certificate and follows GM/T 0015.The security of the label
can be protected by a digital certificate mechanism or an identity-based
cryptographic mechanism, such as IBC.
6.4 Personalized cryptographic service
6.4.1 Overview
Personalized cryptographic services include electronic stamp services, digital
watermark services, fingerprint recognition services.
6.4.2 Electronic stamp service
The electronic stamp service includes stamping the file, checking the stamp,
reading the stamping data. The middleware implements the stamping,
verification, reading functions by calling the electronic stamp service. The
electronic stamp follows the GM/T 0031 technical standard.
6.5 Key object
The key object involved in the middleware is the operator key.
The operator key includes a signature key pair and an encryption key pair as
well as the corresponding signature certificate and encryption certificate.
7 Labels
7.1 Label structure
7.1.1 Logical structure
7.1.1.3 Label body
The structure of the label body is as shown in Figure 8.
7.2 Label attributes
7.2.1 Overview
The label attribute identifies the cryptographic operation associated with the
secured file and the operation log, including. signature attributes and collections,
privilege attributes, stamp attributes, watermark attributes, fingerprint attributes,
content attributes, identity attributes, extension attributes, alignment attributes,
log attributes.
7.2.4 Stamp attributes
The stamp attribute defines the stamping and verification operation of the file.
For the specific structure of the stamp attribute, see GM/T 0031.
8 Basic cryptographic operation
8.1 Overview
Basic cryptographic operations refer to the various common cryptographic
operations that middleware implements on labels and files.
8.2 Label integrity and establishment of binding relationship
This is required when the label is established and updated. The process is as
follows.
8.5 Adding a file signature
Adding a file signature refers to a method for other users to add a file signature
to this file, except for the user who created the file. The process is as follows.
8.6 Verification of file signature
The verification of file signature refers to the verification of signature of the file
specified by the application system. The process is as follows.
8.7 File encryption
File encryption refers to encrypting files as specified by the application system.
The process is as follows.
8.8 File decryption
File decryption refers to the decryption of files as specified by the application
system. The process is as follows.
9 Cryptographic service interface of secured file
9.1 Definition of constant
The definition of the constant is as shown in Table 3.
9.2.7 Extension attributes
The structure definition of lExtendAttr is as shown in Table 10.
9.2.8 Log attributes
The structure definition of IlogAttr is as shown in Table 11.
9.2.9 Stamp attributes
The stamp attribute defines the stamping and verification operation of the file.
For the specific structure of the stamp attribute, see GM/T 0031.
9.4 Definition of interface function
9.4.1 Initialization function
9.4.1.1 Overview
The initialization function includes the following specific functions.
9.4.1.2 Setting cryptographic basic service
Prototype. int SFL_API SFF_SetProvider(IN const char * pszCSPName);
Description.
9.4.2.2 Open secured file label memory
GM/T 0055-2018
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
L 80
Registration number. 62990-2018
GB/T 0055-2018
File cryptographic technical specification
Issued on. MAY 02, 2018
Implemented on. MAY 02, 2018
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms and definitions... 6
4 Abbreviations... 8
5 Labeling mechanism... 8
6 Cryptographic algorithm and cryptographic service... 14
7 Labels... 16
8 Basic cryptographic operation... 31
9 Cryptographic service interface of secured file... 34
Appendix A (Informative) Digital watermark... 86
Appendix B (Informative) Fingerprint recognition... 87
1 Scope
This standard neither standardize the security of the application system, nor
specify specific file types.
This standard is applicable to the relevant standard specifications and
applications that focus on the security of file objects. It is also applicable to the
development and testing of the middleware of cryptographic service of security
electronic files, which can be used to guide the development of application
systems using this middleware.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GM/T 0009 SM2 Cryptography algorithm application specification
GM/T 0015 Digital certificate format based on SM2 algorithm
GM/T 0017 Smart token cryptography application interface data format
specification
GM/T 0019 Universal cryptography service interface specification
GM/T 0031 Secure electronic stamp cryptography technical specification
PKCS # 1 RSA Cryptography Standard
PKCS # 5 Password-based Encryption Standard
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Application system
A system that creates, modifies, authorizes, reads, signs, stamps, prints,
adds watermarks, transfers, archives, destructs files using files as objects.
3.2
File
An entity that is represented numerically and that has a specific meaning for
a particular use object. It may be all kinds of official documents, bills, digital
works, etc.
3.3
Label
A digital entity bound to the file, which is used to identify the attributes and
state of the file; define the operation object, operation behavior, access rights
of the file; record the operation behavior of the operator in the file processing
link; ensure that the file is created, modified, authorized, read, signed off,
stamped, printed, watermark added, circulated, archived, destructed in a
safe and controllable state, thereby providing the basis for traceability and
auditing of the application system.
4 Abbreviations
The following abbreviations apply to this document.
API. Application Programming Interface
ASN.1.Abstract Syntax Notation One
CBC. Cipher-book Chain
CFB. Cipher Feedback
5 Labeling mechanism
5.1 Overall description
This standard uses cryptographic techniques to ensure the confidentiality,
integrity, validity, non-repudiation of files;
5.2 System architecture of label-based secured file
The label-based secured file system includes application systems, middleware,
basic cryptographic services, personalized cryptographic services, as shown in
Figure 1.
5.5 Storage method of secured files
5.5.1 Overview of label
The labels are divided into internal type and external type, which use ASN.1
code. According to the length of the label, it is divided into fixed label and non-
fixed label. The fixed label sets a length when the label is created, so that the
label is always equal to this length; the insufficient part is filled with zero, it is
not allowed to exceed the length. The non-fixed label does not limit the length
of the label and can be arbitrarily increased.
5.5.3 External type
In external storage, labels and files are stored in two separate files. The
correspondence between labels and file entities is managed by the application
system, as shown in Figure 3.
5.6 Binding mechanism of label and file
5.6.3 Verification of binding relationship
As shown in Figure 5, the process of verifying the binding relationship between
a label and a file is as follows.
6 Cryptographic algorithm and cryptographic service
6.1 Cryptographic mechanism
The middleware's cryptographic mechanism is based on the PKI system, which
uses a digital certificate mechanism to secure the files. The digital certificate
uses a dual digital certificate and follows GM/T 0015.The security of the label
can be protected by a digital certificate mechanism or an identity-based
cryptographic mechanism, such as IBC.
6.4 Personalized cryptographic service
6.4.1 Overview
Personalized cryptographic services include electronic stamp services, digital
watermark services, fingerprint recognition services.
6.4.2 Electronic stamp service
The electronic stamp service includes stamping the file, checking the stamp,
reading the stamping data. The middleware implements the stamping,
verification, reading functions by calling the electronic stamp service. The
electronic stamp follows the GM/T 0031 technical standard.
6.5 Key object
The key object involved in the middleware is the operator key.
The operator key includes a signature key pair and an encryption key pair as
well as the corresponding signature certificate and encryption certificate.
7 Labels
7.1 Label structure
7.1.1 Logical structure
7.1.1.3 Label body
The structure of the label body is as shown in Figure 8.
7.2 Label attributes
7.2.1 Overview
The label attribute identifies the cryptographic operation associated with the
secured file and the operation log, including. signature attributes and collections,
privilege attributes, stamp attributes, watermark attributes, fingerprint attributes,
content attributes, identity attributes, extension attributes, alignment attributes,
log attributes.
7.2.4 Stamp attributes
The stamp attribute defines the stamping and verification operation of the file.
For the specific structure of the stamp attribute, see GM/T 0031.
8 Basic cryptographic operation
8.1 Overview
Basic cryptographic operations refer to the various common cryptographic
operations that middleware implements on labels and files.
8.2 Label integrity and establishment of binding relationship
This is required when the label is established and updated. The process is as
follows.
8.5 Adding a file signature
Adding a file signature refers to a method for other users to add a file signature
to this file, except for the user who created the file. The process is as follows.
8.6 Verification of file signature
The verification of file signature refers to the verification of signature of the file
specified by the application system. The process is as follows.
8.7 File encryption
File encryption refers to encrypting files as specified by the application system.
The process is as follows.
8.8 File decryption
File decryption refers to the decryption of files as specified by the application
system. The process is as follows.
9 Cryptographic service interface of secured file
9.1 Definition of constant
The definition of the constant is as shown in Table 3.
9.2.7 Extension attributes
The structure definition of lExtendAttr is as shown in Table 10.
9.2.8 Log attributes
The structure definition of IlogAttr is as shown in Table 11.
9.2.9 Stamp attributes
The stamp attribute defines the stamping and verification operation of the file.
For the specific structure of the stamp attribute, see GM/T 0031.
9.4 Definition of interface function
9.4.1 Initialization function
9.4.1.1 Overview
The initialization function includes the following specific functions.
9.4.1.2 Setting cryptographic basic service
Prototype. int SFL_API SFF_SetProvider(IN const char * pszCSPName);
Description.
9.4.2.2 Open secured file label memory
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0055-2018 be delivered?Answer: The full copy PDF of English version of GM/T 0055-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0055-2018_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0055-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0055-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0055-2018?A step-by-step guide to download PDF of GM/T 0055-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0055-2018". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|