GA/T 988-2012 English PDFUS$489.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 988-2012: Information security technology - Security technical requirements for file encryption products
Basic dataStandard ID: GA/T 988-2012 (GA/T988-2012)Description (Translated English): Information security technology - Security technical requirements for file encryption products Sector / Industry: Public Security (Police) Industry Standard (Recommended) Classification of Chinese Standard: A90 Classification of International Standard: 35.240 Word Count Estimation: 14,128 Quoted Standard: GB/T 5271.8-2001; GB 17859-1999; GB/T 18336.3-2008 Regulation (derived from): Announcement on Publication of Public Safety Industry Standard; Industry Standard Record Announcement No. 3 of 2013 (No. 159) Issuing agency(ies): Ministry of Public Security Summary: This standard specifies the security function requirements, security function requirements, security assurance requirements and classification requirements of the file encryption product. This standard applies to the design, development and testing of fil GA/T 988-2012: Information security technology - Security technical requirements for file encryption products---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - Security technical requirements for file encryption products ICS 35.240 A90 People's Republic of China Public Security Industry Standards Information Security Technology File encryption product safety technical requirements Issued on. 2012-04-25 2012-04-25 implementation People's Republic of China Ministry of Public Security Table of ContentsPreface Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 1 Security functional requirements 5 own security functional requirements 3 6 Security assurance requirements 5 7 Classification of claim 8ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard was proposed by the Ministry of Public Security Network Security Protection Agency. This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center. The main drafters of this standard. Yu excellent, Gu Jianxin, Gu Jian, Zhao Ting, Lu Zhen, Shen Liang, Wuqi Cong, Li, Zhang smiled, Ma Haiyan, Gu Wei, Zou Chunming. Information Security Technology File encryption product safety technical requirements1 ScopeThis standard specifies the security features file encryption product requirements, its own security functional requirements, security assurance requirements and grading requirements. This standard applies to the design, development and testing file encryption products.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 5271.8-2001 Information technology - Vocabulary - Part 8. Security GB 17859-1999 computer information system security protection classification criterion GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance Claim3 Terms and DefinitionsGB/T 5271.8-2001, GB 17859-1999 and GB/T 18336.3-2008 and as defined in the following terms and definitions apply In this document. 3.1 File encryption product fileencryptionproducts Use of cryptographic techniques specified file protection products, including cryptographic techniques shall comply with the relevant provisions of the State Password Administration. 3.2 Key key String symbol sequence to achieve critical information or parameters to control the password-change operations (encryption, decryption) of. 3.3 Cryptographic algorithm cryptographicalgorithm Under the control of a cluster of key mathematical operations, it provides for a series of rules for data encryption and decryption program to achieve the plaintext and ciphertext Among mutual transformation.4 Security functional requirements4.1 encryption and decryption management 4.1.1 File encryption and decryption Products should implement these encryption and decryption functions. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 988-2012_English be delivered?Answer: Upon your order, we will start to translate GA/T 988-2012_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GA/T 988-2012_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 988-2012_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |