|
US$359.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37033.3-2018: Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 37033.3-2018 | English | 359 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management
| Valid |
GB/T 37033.3-2018
|
PDF similar to GB/T 37033.3-2018
Basic data | Standard ID | GB/T 37033.3-2018 (GB/T37033.3-2018) | | Description (Translated English) | Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 18,116 | | Date of Issue | 2018-12-28 | | Date of Implementation | 2019-07-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37033.3-2018: Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Technical requirements for cryptographic application for radio frequency identification systems--Part 3. Technical requirements for key management
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Radio frequency identification system password application technical requirements
Part 3. Key Management Technical Requirements
Part 3. Technicalrequirementsforkeymanagement
Published on.2018-12-28
2019-07-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 symbols and abbreviations 1
5 Overview 2
6 Key Management Model 2
6.1 Symmetric Key Management Model 2
6.2 Asymmetric Key Management Model 3
7 Key Management General Requirements 5
7.1 General Requirements for Symmetric Key Management 5
7.2 General Requirements for Asymmetric Key Management 5
8 Key Management Application Requirements 7
8.1 Symmetric Key Management Application Requirements 7
8.2 Asymmetric Key Management Application Requirements 7
Appendix A (informative) Key Management Example for Radio Frequency Identification System 9
Foreword
GB/T 37033 "Information Security Technology Radio Frequency Identification System Password Application Technical Requirements" is divided into three parts.
--- Part 1. Password security framework and security level;
--- Part 2. Electronic tag and reader and its communication password application technical requirements;
--- Part 3. Key management technical requirements.
This part is the third part of GB/T 37033.
This part is drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This section was drafted. Beijing Zhongdian Huada Electronic Design Co., Ltd., Xingtang Communication Technology Co., Ltd., Shanghai Huashen Smart Card
Application Systems Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Beijing Tongfang Microelectronics Co., Ltd., Fudan University, Aerospace Information
Co., Ltd., Shanghai Huahong IC Co., Ltd., Beijing Huada Zhibao Electronic System Co., Ltd., Huada Semiconductor Co., Ltd.
the company.
The main drafters of this section. Wang Junfeng, Dong Haoran, Chen Yue, Gu Zhen, Zhou Jiansuo, Liu Lina, Yu Jun, Wu Xingjun, Wang Yunsong, Xu Shumin,
Xie Wenlu, Liang Shaofeng, Wang Junyu, Liu Xun.
Information security technology
Radio frequency identification system password application technical requirements
Part 3. Key Management Technical Requirements
1 Scope
This part of GB/T 37033 specifies the use of the cryptographic mechanism for RFID tags, electronic tags, readers and their communication-related
Key management requirements.
This section applies to the design, implementation, evaluation and application of key management in radio frequency identification systems.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 37033.1-2018 Information security technology - Radio frequency identification system - Code - Technical requirements - Part 1
Frame and security level
3 Terms and definitions
The following terms and definitions as defined in GB/T 37033.1-2018 apply to this document.
3.1
Secure password device securecryptographicdevice
Secure storage for secret information such as keys, and devices that provide security services based on such secret information.
3.2
Key split splitknowledge
Two or more entities respectively own key fragments, and key information cannot be synthesized by a single key fragment.
3.3
Key component keycomponent
One of at least two parameters generated by a random or pseudo-random process that can be combined with one or more other parameters to form a
Key.
3.4
Dual control dualcontrol
A process that uses two or more separate entities (usually people) to work together to protect sensitive functions and information.
Note. Individual entities cannot access and use these features or information (such as keys).
4 symbols and abbreviations
The following symbols and abbreviations apply to this document.
CA. Certification Authority (CertificationAuthority)
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 37033.3-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 37033.3-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 37033.3-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37033.3-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|