Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 33560-2017 English PDF

US$459.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 33560-2017: Information security technology -- Cryptographic application identifier criterion specification
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 33560-2017459 Add to Cart 4 days Information security technology -- Cryptographic application identifier criterion specification Valid

Similar standards

GB/T 32918.5   GB/T 33561   GB/T 32921   GB/T 33565   GB/T 33563   

Basic data

Standard ID: GB/T 33560-2017 (GB/T33560-2017)
Description (Translated English): Information security technology -- Cryptographic application identifier criterion specification
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 23,268
Date of Issue: 2017-05-12
Date of Implementation: 2017-12-01
Quoted Standard: GM/Z 0001-2013
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary: This standard specifies the identifiers used in cryptographic applications for the representation and use of the specification algorithm identification, key identification, device identification, data identification, protocol identification, role identification, and so on. This standard applies to the use of the Code, equipment, and password systems. It can also be used to guide the use of identifiers in other relevant standards or protocols. This standard applies only to PKI systems.

GB/T 33560-2017: Information security technology -- Cryptographic application identifier criterion specification


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Cryptographic application identifier criterion specification ICS 35.040 L80 National Standards of People's Republic of China Information security technology - Code application specification 2017-05-12 released 2017-12-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China China National Standardization Management Committee released Directory Preface I Introduction II 1 Scope 1 2 normative reference document 1 3 Terms and definitions 1 4 symbols and abbreviations 1 5 Identify the format and code 2 6 password service class identification 2 6.1 Overview 2 6.2 Algorithm Identification 2 6.3 Data identification 5 6.4 Protocol identification 9 7 security management class identification 10 7.1 Overview 10 7.2 role management logo 10 7.3 Key Management Identifier 11 7.4 System Management Identity 12 7.5 Device Management Identity Appendix A (Normative Appendix) Related OID Definitions in the Field of Commercial Passwords 17 References 19

Foreword

This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed by the National Password Administration. This standard is nationalized by the National Information Security Standardization Technical Committee (SAC/TC260). The drafting unit of this standard. Shandong Dean Information Technology Co., Ltd., Chengdu Guardian Information Industry Co., Ltd., Wuxi Jiangnan Information Safety Engineering Technology Center, Xing Tang Communication Technology Co., Ltd., Shanghai Geer Software Co., Ltd., Beijing Digital Certificate Certification Center, Wanda Information Co., Ltd., Changchun Ji Dazheng Yuan Information Technology Co., Ltd., Haitai radius Technology Co., Ltd., Shanghai Digital Certificate Certification Center. The main drafters of this standard are. Liu Ping, Liu Xiaodong, Kong Fanyu, Li Yuanzheng, Xu Qiang, Liu Zengshou, Li Shusheng, Tan Wuzheng, Li Yufeng, Li Weiping, Cui Jiuqiang, Zhou Dong, Zheng Haisen.

Introduction

In cryptographic applications, a field or phrase is usually used to represent information such as cryptographic algorithms or data entities used, and if not The definition of these identities is unified, it is difficult to achieve the password protocol, password interconnection between the interoperability. The goal of this standard is to standardize the password protocol interface, management and other aspects of the logo used to achieve the password between the various components of the infrastructure Capacity and unity, but also an effective guide to help the development of cryptographic equipment and the realization of the agreement is conducive to the implementation of effective management management. The marks specified in this standard do not apply to wireless communications, financial IC card applications. The preparation of this standard has been the national commercial password application technology system of the overall working group guidance. Information security technology - Code application specification

1 Scope

This standard defines the identifiers used in cryptographic applications for specification of algorithm identification, key identification, device identification, data identification, protocol Identification, role identification, etc., and use. This standard applies to the guidance of cryptographic equipment, password system development and use of the process, the standardization of the use of the logo can also be used Direct the use of the logo in the preparation of other relevant standards or agreements. This standard applies only to PKI systems.

2 normative reference documents

The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article Pieces. For undated references, the latest edition (including all modifications) applies to this document. GM/Z0001-2013 Password terms

3 terms and definitions

GM/Z0001-2013 and the following terms and definitions apply to this document. 3.1 Identifier identifier A 32-bit integer that identifies the cryptographic algorithms, cryptographic protocols, and so on involved in cryptographic services or password management. 3.2 Public key certificate publickeycertificate A digital certificate (digital ID) that establishes the identity of an entity that owns a public key. The certificate is issued by a third party trusted institution, Prove the validity of the binding relationship between the subject public key and the subject identification information. Typically, a certificate contains an unforgeable disclosure related to the subject Key information. 3.3 Network byte order networkbyteorder Using the Big-endian sorting method to specify a good data representation format. The sorting mode with the specific CPU type, the operating system And so can be guaranteed, so that data can be transmitted between different hosts can be correctly explained. 3.4 Label Used to uniquely specify the name of an identifier.

4 symbols and abbreviations

The following symbols and abbreviations apply to this document. BASE64 Converts hexadecimal data to the encoding rules for visible characters CBC Password Blocking Mode (CipherBlockChaining)
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 33560-2017_English be delivered?

Answer: Upon your order, we will start to translate GB/T 33560-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 33560-2017_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 33560-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.