HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 33746.2-2017 English PDF

US$519.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 33746.2-2017: Technical specification of NFC security -- Part 2: Security mechanism requirements
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 33746.2-2017English519 Add to Cart 5 days [Need to translate] Technical specification of NFC security -- Part 2: Security mechanism requirements Valid GB/T 33746.2-2017

PDF similar to GB/T 33746.2-2017


Standard similar to GB/T 33746.2-2017

GB/T 32918.5   GB/T 33561   GB/T 32921   GB/T 37027   GB/T 19713   GB/T 33746.1   

Basic data

Standard ID GB/T 33746.2-2017 (GB/T33746.2-2017)
Description (Translated English) Technical specification of NFC security -- Part 2: Security mechanism requirements
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 26,281
Date of Issue 2017-09-07
Date of Implementation 2018-01-01
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China

GB/T 33746.2-2017: Technical specification of NFC security -- Part 2: Security mechanism requirements


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Technical specification of NFC security - Part 2. Security mechanism requirements ICS 35.040 L80 National Standards of People's Republic of China Near Field Communication (NFC) security technology requirements Part 2. Requirements for safety mechanisms Part 2.Securitymechanismrequirements (ISO /IEC 13157-2.2010, Informationtechnology- systems-NFCSecurity-Part 2.Securitymechanismrequirements, NFC-SECcryptography standard usingECDHandAES, MOD) 2017-09-07Published.2018-01-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 conventions and notations 1 4.1 level with 1 4.2 hexadecimal number 1 5 Abbreviations 2 6 Compliance 3 7 Summary 3 8 Protocol Identifier (PID) 3 9 primitive 3 9.1 Features of the Primitive Summary 3 9.2 Key Agreement 4 9.3 Key derivation function 4 9.4 Key Usage 5 9.5 Key Confirmation 5 9.6 Data Encryption 6 9.7 Data Integrity 6 9.8 Information Sequence Integrity 6 Data Conversion 7 10.1 integer to byte string conversion 7 10.2 byte string to integer conversion 7 10.3 to the byte string conversion 7 10.4 byte string to point conversion 7 11 SSE and SCH service calls 7 11.1 Overview 7 11.2 Prerequisites 8 11.3 Key Agreement 8 11.4 Key Export 9 11.5 Key Confirmation 9 12 SCH Data Exchange 10 12.1 Overview 10 12.2 Preparation 11 12.3 Data Exchange 11 Appendix A (Normative) SM4-XCBC-PRF-128 and SM4-XCBC-MAC-96 Algorithm 13 A.1 SM4-XCBC-PRF-128 13 A.2 SM4-XCBC-MAC-96 13 Appendix B (Normative) Field Length 14 Appendix C (Normative) NEAU-A authentication mechanism 15 C.1 NEAU-A Authentication Mechanism Overview 15 C.2 Preparation 15 C.3 Support Trusted Third Party TTP Identification Process 16 C.4 does not support trusted third-party TTP authentication process 17 C.5 Key derivation 18 Appendix D (Normative) NEAU-S authentication mechanism 19 D.1 NEAU-S Authentication Mechanism Overview 19 D.2 Preparation 19 D.3 Procedure 19

Foreword

GB/T 33746 "Near Field Communication (NFC) safety technology requirements" is divided into the following two parts. --- Part 1. NFCIP-1 security services and protocols; --- Part 2. Safety requirements. This section GB/T 33746 Part 2. This section drafted in accordance with GB/T 1.1-2009 given rules. This section uses the redrafted law to amend the use of ISO /IEC 13157-2.2010 "Information technology systems for communication and information exchange NFC Security Part 2. Security Mechanism Requirements, Cryptographic Criteria Using ECDH and AES. " This part of ISO /IEC 13157-2.2010 technical differences and the reasons are as follows. --- Standard English name changed to TechnicalspecificationofNFCsecurity-Part 2.Securitymechanism requirements --- Increased 3 normative references; --- Added 5 abbreviations; --- Delete the original data Appendix C, an increase of 2 normative Appendix C and Appendix D; --- Replace AES with a password algorithm that complies with the national password management rules. This part of the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This part of the drafting unit. Ministry of Industry and Information Technology Telecommunications Research Institute, Xi'an Jietong Wireless Network Communications Co., Ltd., the national radio Frequency Identification Product Quality Supervision and Inspection Center, China Article Coding Center. The main drafters of this section. Sun Qian, Zhang Linlin, Yang Jun, Du Zhiqiang, Hu Yanan, Yan Ruo, Jiang Guoqiang, Li Zhimin, Luo Yan.

Introduction

This part of the user is the communications industry manufacturing enterprises, testing agencies and technology agencies. The issuing authority of this document draws attention to the fact that statements that conform to this document may relate to Appendix C and "An Entity Bidirectional Identification Method" D and the use of "a method based on symmetric cryptographic algorithms and authentication methods and systems" and other related patents. The issuing authority of this document has no position regarding the authenticity, validity and scope of the above patents. The patentee has assured the issuing authority of this document that he is willing to work with any applicant on terms and conditions reasonably non-discriminatory Patent licensing negotiations. The patent holder's statement has been filed with the issuing authority of this document. Related information is available through the following link Department obtained. Patentee Xi'an Xi Jie Jietong Wireless Network Communications Co., Ltd Address. 68 # Science and Technology Road, Xi'an High-tech Zone, Xi'an Software Park, Qin Feng Club A201 Contact. Liu Changchun Postal code .710075 Email .ipri @ iwncomm.com Phone .029-87607836 Fax .029-87607829 Please note that in addition to the above patents, some of the contents of this document may involve patents. The issuing authority of this document does not undertake to identify these patents Responsibility. Near Field Communication (NFC) security technology requirements Part 2. Requirements for safety mechanisms

1 Scope

GB/T 33746 provisions of this part of the agreement identifier PID 01 message content and encryption methods. This section of the password mechanism Is using the SM2 key exchange protocol as the key agreement protocol and the SM4 block cipher algorithm for data encryption and integrity protection. This section applies to the security mechanism in the establishment of NFC security services requirements.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Information security technology block cipher algorithm working mode GB/T 28455-2012 Information security technology to introduce trusted third-party entity authentication and access architecture specification GB/T 33746.1-2017 Near Field Communication (NFC) security technology requirements Part 1. NFCIP-1 Security Services and Protocols (ISO /IEC 13157-1.2010, MOD) GM/T 0002-2012 SM4 Block Cipher Algorithm GM/T 0003-2012 SM2 Elliptic Curve Public Key Crypto Algorithm ISO /IEC 9798-3.1998/Amd.1.2010 Information technology - Security technology - Entity identification - Part 3. Use of digital signatures Technical Mechanisms Supplement 1 (Informationtechnology-Securitytechniques-Entityauthentication-Part 3. Mechanisms using digitignature techniques-Amendment 1) ISO /IEC 18092-2004 Information technology - Telecommunications and information exchange between systems - Near-field communication interfaces and protocols NFCIP-1 [Informationtechnology-Telecommunications and information exchange between systems- NearFieldCommunication-Interface and Protocol (NFCIP-1)] ISO /IEC .20009-2.2013 Information technology - Security technology Anonymous entity authentication Part 2. Group public key technology Mechanism (Informationtechnology-Securitytechniques-Anonymousentityauthentication-Part 2.Mech- anismsbasedonsignaturesusingagrouppublickey)

3 Terms and definitions

GB/T 33746.1-2017 defined terms and definitions apply to this document.

4 conventions and notations

4.1 level even A∥B represents the concatenation of field A and field B. The B content follows the A content. 4.2 hexadecimal digits (XY) Represents the XY hexadecimal number (that is, in base 16), each pair of characters is encoded as a single byte.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 33746.2-2017_English be delivered?

Answer: Upon your order, we will start to translate GB/T 33746.2-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 33746.2-2017_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 33746.2-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.