GB/T 38644-2020 English PDFUS$489.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 38644-2020: Information security technology - Trusted computing - Testing method of trusted connect Status: Valid
Basic dataStandard ID: GB/T 38644-2020 (GB/T38644-2020)Description (Translated English): Information security technology - Trusted computing - Testing method of trusted connect Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 26,259 Date of Issue: 2020-04-28 Date of Implementation: 2020-11-01 Quoted Standard: GB/T 15843.3; GB/T 20518; GB/T 28455-2012; GB/T 29828-2013; GB/T 32905; GB/T 32907; GB/T 32915; GB/T 32918.1; GB/T 32918.2; GB/T 32918.3; GB/T 32918.4; GB/T 32918.5; GB/T 35276; GM/T 0042-2015; GM/T 0062-2018 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration Summary: This standard specifies the test requirements and methods for the trusted network connection protocol and the cryptographic algorithms involved, including the following: a) the compliance test requirements and methods of the protocol interaction mechanism involved in the trusted network connection protocol; b) the trusted network connection The correctness testing requirements and methods for the implementation of cryptographic algorithms involved in the protocol. This standard is applicable to the testing of trusted connection devices conforming to GB/T 29828-2013, and is used to detect whether its cryptographic algorithms and the implementation of the trusted network connection protocol based on the trusted connection architecture TCA meet the requirements. GB/T 38644-2020: Information security technology - Trusted computing - Testing method of trusted connect---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology--Trusted computing--Testing method of trusted connect ICS 35.040 L80 National Standards of People's Republic of China Information security technology trusted computing Trusted connection test method 2020-04-28 release 2020-11-01 implementation State Administration of Market Supervision and Administration Issued by the National Standardization Management Committee ContentsForeword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Acronyms 2 5 General requirements 3 5.1 Compliance and interoperability requirements of protocol interaction mechanism 3 5.2 The correctness requirements of cryptographic algorithm implementation 4 6 Overview of test methods 4 6.1 Test equipment 4 6.2 Test topology 4 6.3 Test basis 6 6.4 Test instructions 6 7 Protocol interaction mechanism compliance and interoperability testing methods 6 7.1 Port access control test 6 7.2 TAEP protocol packaging test 8 7.3 TAEPoL protocol packaging test 8 7.4 TCP/UDP port test 8 7.5 Trusted connection architecture test 9 8 The correctness test method of cryptographic algorithm implementation 10 8.1 Symmetric cryptographic algorithm test 10 8.2 Digital signature algorithm test 10 8.3 Key exchange protocol testing 10 8.4 Public key encryption algorithm test 11 8.5 Digital certificate format test 11 8.6 Password hashing algorithm test 11 8.7 Random number test 12 8.8 Algorithm performance test 12 Appendix A (Normative Appendix) New data elements involved in trusted connection architecture testing 13 Appendix B (Normative Appendix) Cryptographic Algorithm Performance Test Method and New Data Elements 17ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted by. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology, Zhongguancun Wireless Network Security Industry Alliance (WAPI Industry Alliance), Beijing University of Technology, Commercial Password Testing Center of the National Password Administration, National Information Technology Security Research Center, Beijing Computer Technology and Application Research Institute, China General Technology Research Institute, Tianjin Electromechanical Industry Product Testing Center, National Radio Monitoring Center Testing Center, China Electronics Technology Group Corporation No. 15 Research Institute, Xi’an University of Posts and Telecommunications, Industrial And the Broadband Wireless IP Standards Working Group of the Ministry of Information Technology. The main drafters of this standard. Cao Jun, Li Qin, Du Zhiqiang, Lu Liang, Pan Qi, Lai Yingxu, Huang Zhenhai, Yan Xiang, Wang Guan, Li Dong, Lu Chunmei, Tie Manxia, Liu Kewei, Liu Jingli, Wang Yuehui, Zhang Guoqiang, Zhang Bianling, Jing Jingtao, Xiong Keqi, Zhao Xiaorong, Luo Peng, Wu Dongyu, Lin Dexin, Peng Xiao, Fang Hua, Yu Guangming, Zhu Zhengmei, Zheng Dong, Zhao Hui, Wu Dongyu, Zheng Li, Huang Kuigang.IntroductionGB/T 29828-2013 standardizes the trusted connection architecture based on the ternary peer-to-peer architecture (TrustedConnectArchitecture, TCA), this standard proposes a set of test requirements and methods for the trusted network connection protocol based on TCA. The issuer of this document draws attention to the fact that when a declaration conforms to this document, it may involve Chapter 6, Chapter 7, Chapter 8 and Related patents such as ZL201410255349.X, US15/309,861, JP2016-567036, EP15807391.6, KR10-2016-7034816 usage of. The issuer of this document has no position on the authenticity, validity and scope of the patent. The patent holder has assured the issuer of this document that he is willing to work with any applicant under reasonable and non-discriminatory terms and conditions, Negotiations on patent licensing. The patent holder's statement has been filed with the issuing agency of this document. Relevant information can be contacted through the following Way to get. Patent holder. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd. Address. A201, Qinfengge, Xi'an Software Park, No. 68 Keji 2nd Road, High-tech Zone, Xi'an Contact. Feng Yuchen Postcode. 710075 Email. ipri@iwncomm.com Phone. 029-87607836 Fax. 029-87607829 Please note that in addition to the above patents, some content of this document may still involve patents. The issuer of this document is not responsible for identifying these Responsibilities. Information security technology trusted computing Trusted connection test method1 ScopeAccording to GB/T 29828-2013, this standard specifies the test requirements for trusted network connection protocols and the cryptographic algorithms involved and Methods, including the following. a) Requirements and methods for compliance testing of protocol interaction mechanisms involved in the trusted network connection protocol; b) Requirements and methods for correctness testing of cryptographic algorithms involved in the trusted network connection protocol. This standard is applicable to the testing of trusted connected devices in accordance with GB/T 29828-2013, used to detect its cryptographic algorithm and based on trust Whether the implementation of TCA's trusted network connection protocol meets the requirements.2 Normative referencesThe following documents are essential for the application of this document. For dated references, only the dated version applies to this article Pieces. For the cited documents without date, the latest version (including all amendments) applies to this document. GB/T 15843.3 Information technology security technology entity authentication Part 3. Mechanism using digital signature technology GB/T 20518 Information Security Technology Public Key Infrastructure Digital Certificate Format GB/T 28455-2012 Information security technology introduces trusted third-party entity authentication and access architecture specifications GB/T 29828-2013 Information Security Technology Trusted Computing Specification Trusted Connection Architecture GB/T 32905 information security technology SM3 password hash algorithm GB/T 32907 Information Security Technology SM4 Block Cipher Algorithm GB/T 32915 Information Security Technology Binary Sequence Randomness Detection Method GB/T 32918 (all parts) Information security technology SM2 elliptic curve public key cryptographic algorithm GB/T 35276 Information Security Technology SM2 Cryptographic Algorithm Usage Specification GM/T 0042-2015 ternary peer-to-peer password security protocol test specification GM/T 0062-2018 Password product random number detection requirements3 Terms and definitionsThe terms and definitions defined in GB/T 29828-2013 and the following apply to this document. For ease of use, the following list is repeated Some terms and definitions in GB/T 29828-2013. 3.1 Testedequipment The test object of the trusted network connection protocol is realized. 3.2 Test platform testplatform Test the trusted network connection protocol, with the ability to test the trusted network connection protocol and the cryptographic algorithms involved, collect and analyze The platform analyzes and processes the test data, judges the test data according to the requirements of the test specifications, and presents and records the judgment results. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 38644-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 38644-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 38644-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 38644-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |