HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GM/T 0055-2018 PDF English

US$490.00 · In stock · Download in 9 seconds
GM/T 0055-2018: File cryptographic technical specification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0055-2018English490 Add to Cart 0-9 seconds. Auto-delivery File cryptographic technical specification Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0055-2018
      

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0065   

GM/T 0055-2018: File cryptographic technical specification

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0055-2018
CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.040 L 80 Registration number. 62990-2018 GB/T 0055-2018 File cryptographic technical specification Issued on. MAY 02, 2018 Implemented on. MAY 02, 2018 Issued by. State Cryptography Administration

Table of Contents

Foreword... 4 Introduction... 5 1 Scope... 6 2 Normative references... 6 3 Terms and definitions... 6 4 Abbreviations... 8 5 Labeling mechanism... 8 6 Cryptographic algorithm and cryptographic service... 14 7 Labels... 16 8 Basic cryptographic operation... 31 9 Cryptographic service interface of secured file... 34 Appendix A (Informative) Digital watermark... 86 Appendix B (Informative) Fingerprint recognition... 87

1 Scope

This standard neither standardize the security of the application system, nor specify specific file types. This standard is applicable to the relevant standard specifications and applications that focus on the security of file objects. It is also applicable to the development and testing of the middleware of cryptographic service of security electronic files, which can be used to guide the development of application systems using this middleware.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GM/T 0009 SM2 Cryptography algorithm application specification GM/T 0015 Digital certificate format based on SM2 algorithm GM/T 0017 Smart token cryptography application interface data format specification GM/T 0019 Universal cryptography service interface specification GM/T 0031 Secure electronic stamp cryptography technical specification PKCS # 1 RSA Cryptography Standard PKCS # 5 Password-based Encryption Standard

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Application system A system that creates, modifies, authorizes, reads, signs, stamps, prints, adds watermarks, transfers, archives, destructs files using files as objects. 3.2 File An entity that is represented numerically and that has a specific meaning for a particular use object. It may be all kinds of official documents, bills, digital works, etc. 3.3 Label A digital entity bound to the file, which is used to identify the attributes and state of the file; define the operation object, operation behavior, access rights of the file; record the operation behavior of the operator in the file processing link; ensure that the file is created, modified, authorized, read, signed off, stamped, printed, watermark added, circulated, archived, destructed in a safe and controllable state, thereby providing the basis for traceability and auditing of the application system.

4 Abbreviations

The following abbreviations apply to this document. API. Application Programming Interface ASN.1.Abstract Syntax Notation One CBC. Cipher-book Chain CFB. Cipher Feedback

5 Labeling mechanism

5.1 Overall description This standard uses cryptographic techniques to ensure the confidentiality, integrity, validity, non-repudiation of files; 5.2 System architecture of label-based secured file The label-based secured file system includes application systems, middleware, basic cryptographic services, personalized cryptographic services, as shown in Figure 1. 5.5 Storage method of secured files 5.5.1 Overview of label The labels are divided into internal type and external type, which use ASN.1 code. According to the length of the label, it is divided into fixed label and non- fixed label. The fixed label sets a length when the label is created, so that the label is always equal to this length; the insufficient part is filled with zero, it is not allowed to exceed the length. The non-fixed label does not limit the length of the label and can be arbitrarily increased. 5.5.3 External type In external storage, labels and files are stored in two separate files. The correspondence between labels and file entities is managed by the application system, as shown in Figure 3. 5.6 Binding mechanism of label and file 5.6.3 Verification of binding relationship As shown in Figure 5, the process of verifying the binding relationship between a label and a file is as follows.

6 Cryptographic algorithm and cryptographic service

6.1 Cryptographic mechanism The middleware's cryptographic mechanism is based on the PKI system, which uses a digital certificate mechanism to secure the files. The digital certificate uses a dual digital certificate and follows GM/T 0015.The security of the label can be protected by a digital certificate mechanism or an identity-based cryptographic mechanism, such as IBC. 6.4 Personalized cryptographic service 6.4.1 Overview Personalized cryptographic services include electronic stamp services, digital watermark services, fingerprint recognition services. 6.4.2 Electronic stamp service The electronic stamp service includes stamping the file, checking the stamp, reading the stamping data. The middleware implements the stamping, verification, reading functions by calling the electronic stamp service. The electronic stamp follows the GM/T 0031 technical standard. 6.5 Key object The key object involved in the middleware is the operator key. The operator key includes a signature key pair and an encryption key pair as well as the corresponding signature certificate and encryption certificate.

7 Labels

7.1 Label structure 7.1.1 Logical structure 7.1.1.3 Label body The structure of the label body is as shown in Figure 8. 7.2 Label attributes 7.2.1 Overview The label attribute identifies the cryptographic operation associated with the secured file and the operation log, including. signature attributes and collections, privilege attributes, stamp attributes, watermark attributes, fingerprint attributes, content attributes, identity attributes, extension attributes, alignment attributes, log attributes. 7.2.4 Stamp attributes The stamp attribute defines the stamping and verification operation of the file. For the specific structure of the stamp attribute, see GM/T 0031.

8 Basic cryptographic operation

8.1 Overview Basic cryptographic operations refer to the various common cryptographic operations that middleware implements on labels and files. 8.2 Label integrity and establishment of binding relationship This is required when the label is established and updated. The process is as follows. 8.5 Adding a file signature Adding a file signature refers to a method for other users to add a file signature to this file, except for the user who created the file. The process is as follows. 8.6 Verification of file signature The verification of file signature refers to the verification of signature of the file specified by the application system. The process is as follows. 8.7 File encryption File encryption refers to encrypting files as specified by the application system. The process is as follows. 8.8 File decryption File decryption refers to the decryption of files as specified by the application system. The process is as follows.

9 Cryptographic service interface of secured file

9.1 Definition of constant The definition of the constant is as shown in Table 3. 9.2.7 Extension attributes The structure definition of lExtendAttr is as shown in Table 10. 9.2.8 Log attributes The structure definition of IlogAttr is as shown in Table 11. 9.2.9 Stamp attributes The stamp attribute defines the stamping and verification operation of the file. For the specific structure of the stamp attribute, see GM/T 0031. 9.4 Definition of interface function 9.4.1 Initialization function 9.4.1.1 Overview The initialization function includes the following specific functions. 9.4.1.2 Setting cryptographic basic service Prototype. int SFL_API SFF_SetProvider(IN const char * pszCSPName); Description. 9.4.2.2 Open secured file label memory GM/T 0055-2018 CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.040 L 80 Registration number. 62990-2018 GB/T 0055-2018 File cryptographic technical specification Issued on. MAY 02, 2018 Implemented on. MAY 02, 2018 Issued by. State Cryptography Administration

Table of Contents

Foreword... 4 Introduction... 5 1 Scope... 6 2 Normative references... 6 3 Terms and definitions... 6 4 Abbreviations... 8 5 Labeling mechanism... 8 6 Cryptographic algorithm and cryptographic service... 14 7 Labels... 16 8 Basic cryptographic operation... 31 9 Cryptographic service interface of secured file... 34 Appendix A (Informative) Digital watermark... 86 Appendix B (Informative) Fingerprint recognition... 87

1 Scope

This standard neither standardize the security of the application system, nor specify specific file types. This standard is applicable to the relevant standard specifications and applications that focus on the security of file objects. It is also applicable to the development and testing of the middleware of cryptographic service of security electronic files, which can be used to guide the development of application systems using this middleware.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GM/T 0009 SM2 Cryptography algorithm application specification GM/T 0015 Digital certificate format based on SM2 algorithm GM/T 0017 Smart token cryptography application interface data format specification GM/T 0019 Universal cryptography service interface specification GM/T 0031 Secure electronic stamp cryptography technical specification PKCS # 1 RSA Cryptography Standard PKCS # 5 Password-based Encryption Standard

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Application system A system that creates, modifies, authorizes, reads, signs, stamps, prints, adds watermarks, transfers, archives, destructs files using files as objects. 3.2 File An entity that is represented numerically and that has a specific meaning for a particular use object. It may be all kinds of official documents, bills, digital works, etc. 3.3 Label A digital entity bound to the file, which is used to identify the attributes and state of the file; define the operation object, operation behavior, access rights of the file; record the operation behavior of the operator in the file processing link; ensure that the file is created, modified, authorized, read, signed off, stamped, printed, watermark added, circulated, archived, destructed in a safe and controllable state, thereby providing the basis for traceability and auditing of the application system.

4 Abbreviations

The following abbreviations apply to this document. API. Application Programming Interface ASN.1.Abstract Syntax Notation One CBC. Cipher-book Chain CFB. Cipher Feedback

5 Labeling mechanism

5.1 Overall description This standard uses cryptographic techniques to ensure the confidentiality, integrity, validity, non-repudiation of files; 5.2 System architecture of label-based secured file The label-based secured file system includes application systems, middleware, basic cryptographic services, personalized cryptographic services, as shown in Figure 1. 5.5 Storage method of secured files 5.5.1 Overview of label The labels are divided into internal type and external type, which use ASN.1 code. According to the length of the label, it is divided into fixed label and non- fixed label. The fixed label sets a length when the label is created, so that the label is always equal to this length; the insufficient part is filled with zero, it is not allowed to exceed the length. The non-fixed label does not limit the length of the label and can be arbitrarily increased. 5.5.3 External type In external storage, labels and files are stored in two separate files. The correspondence between labels and file entities is managed by the application system, as shown in Figure 3. 5.6 Binding mechanism of label and file 5.6.3 Verification of binding relationship As shown in Figure 5, the process of verifying the binding relationship between a label and a file is as follows.

6 Cryptographic algorithm and cryptographic service

6.1 Cryptographic mechanism The middleware's cryptographic mechanism is based on the PKI system, which uses a digital certificate mechanism to secure the files. The digital certificate uses a dual digital certificate and follows GM/T 0015.The security of the label can be protected by a digital certificate mechanism or an identity-based cryptographic mechanism, such as IBC. 6.4 Personalized cryptographic service 6.4.1 Overview Personalized cryptographic services include electronic stamp services, digital watermark services, fingerprint recognition services. 6.4.2 Electronic stamp service The electronic stamp service includes stamping the file, checking the stamp, reading the stamping data. The middleware implements the stamping, verification, reading functions by calling the electronic stamp service. The electronic stamp follows the GM/T 0031 technical standard. 6.5 Key object The key object involved in the middleware is the operator key. The operator key includes a signature key pair and an encryption key pair as well as the corresponding signature certificate and encryption certificate.

7 Labels

7.1 Label structure 7.1.1 Logical structure 7.1.1.3 Label body The structure of the label body is as shown in Figure 8. 7.2 Label attributes 7.2.1 Overview The label attribute identifies the cryptographic operation associated with the secured file and the operation log, including. signature attributes and collections, privilege attributes, stamp attributes, watermark attributes, fingerprint attributes, content attributes, identity attributes, extension attributes, alignment attributes, log attributes. 7.2.4 Stamp attributes The stamp attribute defines the stamping and verification operation of the file. For the specific structure of the stamp attribute, see GM/T 0031.

8 Basic cryptographic operation

8.1 Overview Basic cryptographic operations refer to the various common cryptographic operations that middleware implements on labels and files. 8.2 Label integrity and establishment of binding relationship This is required when the label is established and updated. The process is as follows. 8.5 Adding a file signature Adding a file signature refers to a method for other users to add a file signature to this file, except for the user who created the file. The process is as follows. 8.6 Verification of file signature The verification of file signature refers to the verification of signature of the file specified by the application system. The process is as follows. 8.7 File encryption File encryption refers to encrypting files as specified by the application system. The process is as follows. 8.8 File decryption File decryption refers to the decryption of files as specified by the application system. The process is as follows.

9 Cryptographic service interface of secured file

9.1 Definition of constant The definition of the constant is as shown in Table 3. 9.2.7 Extension attributes The structure definition of lExtendAttr is as shown in Table 10. 9.2.8 Log attributes The structure definition of IlogAttr is as shown in Table 11. 9.2.9 Stamp attributes The stamp attribute defines the stamping and verification operation of the file. For the specific structure of the stamp attribute, see GM/T 0031. 9.4 Definition of interface function 9.4.1 Initialization function 9.4.1.1 Overview The initialization function includes the following specific functions. 9.4.1.2 Setting cryptographic basic service Prototype. int SFL_API SFF_SetProvider(IN const char * pszCSPName); Description. 9.4.2.2 Open secured file label memory ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0055-2018 be delivered?

Answer: The full copy PDF of English version of GM/T 0055-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0055-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0055-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0055-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0055-2018?

A step-by-step guide to download PDF of GM/T 0055-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0055-2018".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9