US$459.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 33560-2017: Information security technology -- Cryptographic application identifier criterion specification Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 33560-2017 | English | 459 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology -- Cryptographic application identifier criterion specification
| Valid |
GB/T 33560-2017
|
PDF similar to GB/T 33560-2017
Basic data Standard ID | GB/T 33560-2017 (GB/T33560-2017) | Description (Translated English) | Information security technology -- Cryptographic application identifier criterion specification | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.040 | Word Count Estimation | 23,268 | Date of Issue | 2017-05-12 | Date of Implementation | 2017-12-01 | Quoted Standard | GM/Z 0001-2013 | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | Summary | This standard specifies the identifiers used in cryptographic applications for the representation and use of the specification algorithm identification, key identification, device identification, data identification, protocol identification, role identification, and so on. This standard applies to the use of the Code, equipment, and password systems. It can also be used to guide the use of identifiers in other relevant standards or protocols. This standard applies only to PKI systems. |
GB/T 33560-2017: Information security technology -- Cryptographic application identifier criterion specification ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Cryptographic application identifier criterion specification
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology - Code application specification
2017-05-12 released
2017-12-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Management Committee released
Directory
Preface I
Introduction II
1 Scope 1
2 normative reference document 1
3 Terms and definitions 1
4 symbols and abbreviations 1
5 Identify the format and code 2
6 password service class identification 2
6.1 Overview 2
6.2 Algorithm Identification 2
6.3 Data identification 5
6.4 Protocol identification 9
7 security management class identification 10
7.1 Overview 10
7.2 role management logo 10
7.3 Key Management Identifier 11
7.4 System Management Identity 12
7.5 Device Management Identity
Appendix A (Normative Appendix) Related OID Definitions in the Field of Commercial Passwords 17
References 19
Foreword
This standard is drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed by the National Password Administration.
This standard is nationalized by the National Information Security Standardization Technical Committee (SAC/TC260).
The drafting unit of this standard. Shandong Dean Information Technology Co., Ltd., Chengdu Guardian Information Industry Co., Ltd., Wuxi Jiangnan Information
Safety Engineering Technology Center, Xing Tang Communication Technology Co., Ltd., Shanghai Geer Software Co., Ltd., Beijing Digital Certificate Certification Center,
Wanda Information Co., Ltd., Changchun Ji Dazheng Yuan Information Technology Co., Ltd., Haitai radius Technology Co., Ltd., Shanghai Digital Certificate
Certification Center.
The main drafters of this standard are. Liu Ping, Liu Xiaodong, Kong Fanyu, Li Yuanzheng, Xu Qiang, Liu Zengshou, Li Shusheng, Tan Wuzheng, Li Yufeng, Li Weiping,
Cui Jiuqiang, Zhou Dong, Zheng Haisen.
Introduction
In cryptographic applications, a field or phrase is usually used to represent information such as cryptographic algorithms or data entities used, and if not
The definition of these identities is unified, it is difficult to achieve the password protocol, password interconnection between the interoperability.
The goal of this standard is to standardize the password protocol interface, management and other aspects of the logo used to achieve the password between the various components of the infrastructure
Capacity and unity, but also an effective guide to help the development of cryptographic equipment and the realization of the agreement is conducive to the implementation of effective management management.
The marks specified in this standard do not apply to wireless communications, financial IC card applications.
The preparation of this standard has been the national commercial password application technology system of the overall working group guidance.
Information security technology - Code application specification
1 Scope
This standard defines the identifiers used in cryptographic applications for specification of algorithm identification, key identification, device identification, data identification, protocol
Identification, role identification, etc., and use.
This standard applies to the guidance of cryptographic equipment, password system development and use of the process, the standardization of the use of the logo can also be used
Direct the use of the logo in the preparation of other relevant standards or agreements.
This standard applies only to PKI systems.
2 normative reference documents
The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article
Pieces. For undated references, the latest edition (including all modifications) applies to this document.
GM/Z0001-2013 Password terms
3 terms and definitions
GM/Z0001-2013 and the following terms and definitions apply to this document.
3.1
Identifier identifier
A 32-bit integer that identifies the cryptographic algorithms, cryptographic protocols, and so on involved in cryptographic services or password management.
3.2
Public key certificate publickeycertificate
A digital certificate (digital ID) that establishes the identity of an entity that owns a public key. The certificate is issued by a third party trusted institution,
Prove the validity of the binding relationship between the subject public key and the subject identification information. Typically, a certificate contains an unforgeable disclosure related to the subject
Key information.
3.3
Network byte order networkbyteorder
Using the Big-endian sorting method to specify a good data representation format. The sorting mode with the specific CPU type, the operating system
And so can be guaranteed, so that data can be transmitted between different hosts can be correctly explained.
3.4
Label
Used to uniquely specify the name of an identifier.
4 symbols and abbreviations
The following symbols and abbreviations apply to this document.
BASE64 Converts hexadecimal data to the encoding rules for visible characters
CBC Password Blocking Mode (CipherBlockChaining)
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 33560-2017_English be delivered?Answer: Upon your order, we will start to translate GB/T 33560-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 33560-2017_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 33560-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|