GB/T 15843.3-2023 English PDFUS$514.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 15843.3-2023: Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques Status: Valid GB/T 15843.3: Historical versions
Basic dataStandard ID: GB/T 15843.3-2023 (GB/T15843.3-2023)Description (Translated English): Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 26,263 Date of Issue: 2023-03-17 Date of Implementation: 2023-10-01 Older Standard (superseded by this standard): GB/T 15843.3-2016 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 15843.3-2023: Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. ICS 35.030 CCSL80 National Standards of People's Republic of China Replace GB/T 15843.3-2016 Information Technology Security Technology Entity Authentication Part 3.Mechanisms using digital signature technology Released on 2023-03-17 2023-10-01 implementation State Administration for Market Regulation Released by the National Standardization Management Committee table of contentsPreface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols and abbreviations 2 4.1 Symbol 2 4.2 Abbreviations 3 5 General 3 5.1 Time-varying parameters 3 5.2 Token 3 5.3 Usage of Text field 3 6 Requirements 4 7 Mechanisms that do not introduce online trusted third parties4 7.1 One-way authentication 4 7.2 Two-way authentication 6 8 Mechanisms for Introducing Online Trusted Third Parties9 8.1 General 9 8.2 One-way authentication 9 8.3 Two-way authentication 11 Appendix A (Normative) Object Identifiers 17 A.1 Form definition 17 A.2 Use of Subsequent Object Identifiers 17 Appendix B (Informative) User Guide 18 B.1 Security properties 18 B.2 Comparison and selection of mechanisms19 Appendix C (informative) How to use the Text field 20 Reference 21forewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules for Standardization Documents" drafting. This document is part 3 of GB/T 15843 "Information Technology Security Technical Entity Identification". GB/T 15843 has been issued The following sections. --- Part 1.General; --- Part 2.Mechanisms using symmetric encryption algorithms; --- Part 3.Mechanisms using digital signature technology; --- Part 4.Mechanisms using cryptographic verification functions; --- Part 5.Mechanisms for using zero-knowledge technology; --- Part 6.Using manual data transfer mechanism. This document replaces GB/T 15843.3-2016 "Information Technology Security Technical Entity Authentication - Part 3.Using digital signature technology Compared with GB/T 15843.3-2016, except for structural adjustment and editorial changes, the main technical changes are as follows. a) Added "Symbols and Abbreviations" (see Chapter 4); b) Added "General Principles" (see Chapter 5); c) Added "one-way authentication" (see 8.2); d) Added "seven pass identification" (see 8.3.4); e) Added "Guidelines for Use" (see Appendix B). This document is equivalent to ISO /IEC 9798-3.2019 "IT Security Technology Entity Authentication Part 3.Mechanisms Using Digital Signature Technology". The following minimal editorial changes have been made to this document. ---In order to coordinate with my country's technical standard system, the name of the standard is changed to "Information Technology Security Technical Entity Identification Part 3. Mechanisms using digital signature technology"; ---In order to conform to the technical expression habits of our country, TP (third party) is changed to TTP (trusted third party); --- For the convenience of understanding, an informative note was added to 5.1, 8.1, and 8.2.1 respectively. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document is drafted by. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., Zhongguancun Wireless Network Security Industry Alliance, National Information Technology Security Research Center, China Mobile Communications Group Co., Ltd., China Energy Fusion Smart Technology Co., Ltd., China Southern Power Grid Co., Ltd. The responsible company, Beijing Digital Certification Co., Ltd., the Institute of Software of the Chinese Academy of Sciences, the First Research Institute of the Ministry of Public Security, and the State Encryption Administration Password Testing Center, National Radio Monitoring Center Testing Center, Guangxi University, China Radio and Television Network Group Co., Ltd., Guangxi Chengxin Huichuang Technology Co., Ltd., Geer Software Co., Ltd., Guangxi Flux Energy Technology Co., Ltd., China General Technology Research Institute, Beijing Institute of Computer Technology and Applications. The main drafters of this document. Cao Jun, Du Zhiqiang, Zhang Lulu, Wang Hong, Chen Yu, Li Qin, Huang Zhenhai, Wang Yuehui, Zhang Bianling, Tie Manxia, Zhang Yang, Wang Li, Hou Pengliang, Hu Xiaoliang, Zheng Li, Sha Xuesong, Lai Xiaolong, Zhao Xiaorong, Yan Xiang, Zhang Guoqiang, Chen Baoren, Zhang Liwu, Zhang Yan, Jiang Caiping, Jian Jian, Zhou Tao, Li Dong, Li Guoyou, Tao Hongbo, Yin Yuang, Luo Peng, Deng Kaiyong, Lu Quan, Li Shuang, Wei Lina, Zheng Qiang, Wei Changcai, Liu Kewei, Yu Guangming, Wang Rui, Li Yujiao, Zhu Zhengmei, Zhao Hui, Jia Jia, Liu Hongyun, He Shuangyu, Li Nan, Jing Jingtao, Pan Qi, Chen Weigang, Bai Kunpeng, Zhang Zhijun, Sun Shuo, Chen Xiaolong, Lu Liang, Guo Jinfa, Tian Yucun. The release status of previous versions of this document and the documents it replaces are as follows. --- First published as GB/T 15843.3-1998 in.1998, first revised in.2008, and second revised in.2016; --- This is the third revision.IntroductionThis document stipulates that the entity authentication mechanism using digital signature technology is divided into two types. one-way authentication and two-way authentication. Among them, one-way authentication is pressed According to the number of message transmissions, it is divided into one-pass authentication, two-pass authentication and four-pass authentication; two-way authentication is based on the number of message transmissions, Divided into two-pass authentication, three-pass authentication, five-pass authentication and seven-pass authentication. GB/T 15843 aims to standardize entity authentication technology and consists of 6 parts. --- Part 1.General. The purpose is to standardize the model, framework and general requirements of entity authentication technology. --- Part 2.Mechanisms using symmetric encryption algorithms. The purpose is to standardize six entity authentication mechanisms based on symmetric encryption algorithms and relevant requirements. --- Part 3.Mechanisms using digital signature technology. The purpose is to standardize ten kinds of entity authentication mechanisms based on digital signature technology and related requirements. --- Part 4.Mechanisms using cryptographic verification functions. The purpose is to standardize four entity authentication mechanisms based on password verification functions and related requirements. --- Part 5.Mechanisms for using zero-knowledge techniques. The purpose is to standardize five entity authentication mechanisms based on zero-knowledge technology and related related requirements. --- Part 6.Using manual data transfer mechanism. The purpose is to standardize eight entity authentication mechanisms based on manual data transfer and related requirements. Since the distribution of certificates used for signing is beyond the scope of this document, distribution of certificates is optional in all mechanisms. The issuer of this document draws attention to the fact that when declaring compliance with this document, CN201510654832.X, CN201510654832.X, JP5425314B2, EP2472772, KR10-1405509, CN200910023774.5, CN200910023735.5, US8,763,100B2, JP5468138B2, KR10-1471259, CN200910023734.0, US8,732,464B2, JP5468137B2, KR10-1471827, 1139547, RU2445741C2, CN200710018920.6, US8,356,179B2, EP2214429B1, JP5099568B2, KR10- 1117393, RU2458481C2, CN201510654785.9, US10,615,978B2, JP6687728, EP16853041.8, KR10- The use of patents such as 2141289 and CN201510654784.4. The issuing agency of this document takes no position on the veracity, validity and scope of the above patents. The above-mentioned patent holder has undertaken to the issuing authority of this document that he is willing to cooperate with any applicant on reasonable and non-discriminatory terms and conditions Next, negotiate the licensing of patents. Statements from the above patent holders are on file with the issuing authority of this document. Relevant information can be passed through Obtained through the following contact information. Name of patent holder. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd. Address. A201, Qinfengge, Xi'an Software Park, No. 68, Keji 2nd Road, High-tech Zone, Xi'an Contact. Wang Lizhen Zip Code. 710075 Email. ipri@iwncomm.com Tel. 029-87607836 Fax. 029-87607829 Please note that in addition to the above patents, some content of this document may still involve patents. The issuer of this document is not responsible for identifying patents responsibility. Information Technology Security Technology Entity Authentication Part 3.Mechanisms using digital signature technology1 ScopeThis document specifies two types of entity authentication mechanisms using digital signature technology. The first category does not introduce online trusted third parties, including two One-way authentication mechanism and three kinds of two-way authentication mechanism; the second type introduces online trusted third party, also includes two kinds of one-way authentication mechanism and three kinds of two-way authentication mechanism authentication mechanism. This document is applicable to guide the research of entity authentication mechanism using digital signature technology, as well as the development and application of related products and systems. Appendix A defines the object identifiers for the entity authentication mechanisms specified in this document.2 Normative referencesThe contents of the following documents constitute the essential provisions of this document through normative references in the text. Among them, dated references For documents, only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to this document. GB/T 15843.1-2017 Information Technology Security Technology Entity Identification Part 1.General Principles (ISO /IEC 9798-1. 2010, IDT) ISO /IEC 9796 (all parts) Information technology security techniques digital signature scheme with message recovery (Information Note. GB/T 15851.3-2018 Information Technology Security Technology Digital Signature Scheme with Message Recovery Part 3.Mechanism Based on Discrete Logarithm (ISO /IEC 9796-3.2006, MOD) ISO /IEC 14888 (all parts) Information technology security techniques Digital signature with appendices (Information Note. GB/T 17902.2-2005 Information technology security technology digital signature with appendix Part 2.Identity-based mechanism (ISO / IEC 14888-2.1999, IDT) GB/T 17902.3-2005 Information Technology Security Technology Digital Signature with Appendix Part 3.Certificate-Based Mechanism (ISO / IEC 14888-3.1998, IDT)3 Terms and DefinitionsThe following terms and definitions apply to this document. 3.1 Atomic business atomictransaction A business that cannot be further split into multiple smaller businesses. 3.2 claiming party claimant The authenticated entity itself or some representative entity for the purpose of authentication. Note. The claiming party has the parameters and private data needed to authenticate the exchange. [Source. GB/T 15843.1-2017, 3.6] ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 15843.3-2023_English be delivered?Answer: Upon your order, we will start to translate GB/T 15843.3-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 15843.3-2023_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 15843.3-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.Question 5: Should I purchase the latest version GB/T 15843.3-2023?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 15843.3-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically. |