Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GM/T 0035.4-2014 PDF English

US$150.00 · In stock · Download in 9 seconds
GM/T 0035.4-2014: Specifications of Cryptographic Application for RFID Systems - Part 4: Specification of Cryptographic Application for Communication between RFID Tag and Reader
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDUSDBUY PDFDeliveryStandard Title (Description)Status
GM/T 0035.4-2014150 Add to Cart Auto, 9 seconds. Specifications of Cryptographic Application for RFID Systems - Part 4: Specification of Cryptographic Application for Communication between RFID Tag and Reader Valid

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0035.2   

GM/T 0035.4-2014: Specifications of Cryptographic Application for RFID Systems - Part 4: Specification of Cryptographic Application for Communication between RFID Tag and Reader


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0035.4-2014
GM NATIONAL CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Record No.. 44639-2014 Specifications of Cryptographic Application for RFID Systems – Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader Issued on: FEBRUARY 13, 2014 Implemented on: FEBRUARY 13, 2014 Issued by. State Cryptography Administration

Table of Contents

Foreword ... 3 1 Scope .. 4 2 Normative References ... 4 3 Terms and Definitions ... 4 4 Symbols and Abbreviation .. 4 5 Cryptographic Security Factor .. 5 5.1 Confidentiality of transmission information ... 5 5.2 Integrity of transmission information ... 5 5.3 ID authentication ... 5 6 Technical Requirements for Cryptographic Security ... 6 7 Realization Mode for Cryptographic Security of Communication ... 6 7.1 Confidentiality of transmission information ... 6 7.2 Integrity of transmission information ... 8 7.3 ID authentication ... 9 Appendix A (Informative) Two-Way ID Authentication and Stream Encryption Application by Using SM7 Symmetric Block Cryptographic Algorithm .. 14 Appendix B (Informative) Two-Way ID Authentication and Key Negotiation by Using Asymmetric Cryptographic Algorithm .. 16

Foreword

GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be divided into 5 parts. --- Part 1. Cryptographic Protection Framework and Security Levels; --- Part 2. Specification of Cryptographic Application for RFID tag chip; --- Part 3. Specification of Cryptographic Application for RFID Reader; --- Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader; --- Part 5. Specification for Key Management. This Part belongs to Part 4 of GM/T 0035. This Part shall be drafted as per the rules of GB/T 1.1-2009. This Part was proposed and under the jurisdiction of Cryptographic Industry Standardization Technical Committee. Drafting organizations of this Part. Beijing Tongfang Micro-Electronics Co., Ltd., Xingtang Communication Technology Co., Ltd., Beijing Zhongdian Huada Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Aisino Co., Ltd., Shanghai Hsic Application System Co., Ltd., Fudan University, Shanghai Huahong Integrated Circuit Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd. Chief drafting staffs of this Part. Wu Xingjun, Dong Haoran, Wang Junfeng, Zhou Jiansuo, Chen Yue, Yu Jun, Liang Shaofeng, Xie Wenlu, Wang Yunsong, Xu Shumin, Gu Zhen, Wang Junyu, Liu Xun, and Wang Huibo. Specifications of Cryptographic Application for RFID Systems – Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader

1 Scope

This Part of GM/T 0035 specifies the security requirements and realization modes for the ID authentication, confidentiality and integrity of transmission information between RFID tag and reader. This Part is applicable to the security design, realization and application for the communication between RFID tag and reader in the RFID system.

2 Normative References

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this document. GM/T 0035.1-2014 Specifications of Cryptographic Application for RFID Systems. Part 1. Cryptographic Protection Framework and Security Levels GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems - Part 5. Specification for Key Management

3 Terms and Definitions

The terms and definitions stipulated in GM/T 0035.1-2014 are applicable to this document.

4 Symbols and Abbreviation

The symbols and abbreviation stipulated in GM/T 0035.1-2014 are applicable to this When adopting the stream encryption mode, the data sender and receiver have the common cipher stream generator; such cipher stream generator shall be initialized by the transmission encryption key KTR and the random number of RR and RT generated by both parties. When adopting OFB mode to generate the cipher stream, and the cipher stream shall be used in order without discarding. The sender uses cipher stream to perform linear operation against the plaintext data bit-by-bit (such as bit exclusive- or operation), then the ciphertext data for transmission is generated. After the receiver receives such ciphertext data, use the same linear operation bit-by-bit as the sender to restore the original plaintext data. 7.2 Integrity of transmission information 7.2.1 Use verification method for integrity of CBC-MAC During the communication process between RFID tag and reader, before sender sends the sensitive information, the RFID reader reads the UID of the RFID tag; use such UID to disperse the derivation key and obtain the personalized key K1 of RFID tag. During the communication process between the two parties, use the MAC mode to perform the verification of integrity; the specific process is as follows. a) The sender uses the personalized key K1 to compute the MAC value of the to-be- sent information M. MAC1 = MAC (M, K1); attaches the MAC1 after the information M; sends Token 1 = (M II MAC1) to the receiver. b) After receiver receives the Token 1, use the personalized key K1 to compute the MAC value of received information M. MAC2 = MAC (M, K1); compare the MAC1 with MAC2, it they are equal, then the integrity verification is passed. The computing process of MAC is as follows. a) The information M is divided into data blocks M1, M2, . Mj with length of n bits. If the length of Mj is insufficient, it shall be supplemented behind; the supplementing mode shall be specified by the specific application; If the length of Mj is just n bits; then supplement one data block behind it. b) Compute C1 = Enc (M1, K1). c) When j >1, compute ; thereof, i =2, 3, . j. d) MAC = Cj. 7.2.2 Use verification method for the integrity of HMAC During the communication process between RFID tag and reader, before sender sends the sensitive information, the RFID reader reads the UID of the RFID tag; use such UID to disperse the derivation key and obtain the personalized key K1 of RFID tag. RFID tag through comparing whether the MAC is consistent with MAC’. 7.3.2 One-way ID authentication 7.3.2.1 RFID tag’s challenge response authentication against RFID reader The RFID tag identifies the authenticity of RFID reader’s ID. Before authentication, the RFID reader reads the UID of RFID tag; use such UID (or other parameters with unique characteristic) to disperse the derivation key, obtain derived key K1 that is consistent with the personalized key stored in the RFID tag. The generation process of derived key shall refer to GM/T 0035.5-2014. The authentication process is as follows. a) The RFID reader sends the command of “ID authentication” to the RFID tag; one random number of RT is generated in the RFID tag; and send it to the RFID reader. The RFID tag use the Key K1 to encrypt the random number RT; and calculate the RT’ = Enc (RT, K1). b) The RFID reader sue the Key K1 to encrypt the random number RT; then calculate the RT’’ = Enc (RT, K1); send RT’’ to the RFID tag. c) Compare RT’ with RT’’ received by the RFID tag. If RT’ = RT’’, then the authentication against the RFID reader is passed. 7.3.2.2 RFID reader’s challenge response authentication against RFID tag The RFID reader identifies the authenticity of RFID tag’s ID. Before authentication, the RFID reader reads the UID of RFID tag; use such UID (or other parameters with the unique characteristic) to disperse the derivation key and obtain the derived key K1 that is consistent with the personalized key stored in the RFID tag. The generation process of derived key shall refer to GM/T 0035.5-2014. Authentication process is as follows. a) The RFID reader generates random number RR, sends it to the RIFD tag. The RFID reader uses Key K1 to encrypt the RR, calculate the RR’ = Enc (RR, K1). b) The RFID tag use Key K1 to encrypt the RR, calculate the RR’’ = Enc (RR, K1), send RR’’ to the RFID reader. c) The RFID reader compares RR’ with RR’’. If RR’’ = RR’, then the authentication against the RFID tag is passed. 7.3.3 Two-way ID authentication

Appendix A

(Informative) Two-Way ID Authentication and Stream Encryption Application by Using SM7 Symmetric Block Cryptographic Algorithm A.1 Overview This Appendix gives a two-way ID authentication mode by using SM7 symmetric block cryptographic algorithm, the initial vector generated in the two-way ID authentication process and used for the generation of stream encryp... ......

Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Image 1     Image 2     Image 3     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of English version of GM/T 0035.4-2014 be delivered?Answer: The full copy PDF of English version of GM/T 0035.4-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0035.4-2014_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0035.4-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0035.4-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0035.4-2014?

A step-by-step guide to download PDF of GM/T 0035.4-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0035.4-2014".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9