HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (7 Jun 2025)

English GB/T 37092-2018 PDF

Search result: GB/T 37092-2018
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 37092-2018English999 Add to Cart 7 days [Need to translate] Information security technology -- Security requirements for cryptographic modules Valid GB/T 37092-2018


BASIC DATA
Standard ID GB/T 37092-2018 (GB/T37092-2018)
Description (Translated English) Information security technology -- Security requirements for cryptographic modules
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 50,512
Date of Issue 2018-12-28
Date of Implementation 2019-07-01


GB/T 37092-2018 Information security technology--Security requirements for cryptographic modules ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Password Module Security Requirements Published on.2018-12-28 2019-07-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword I Introduction II 1 range 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 password module security level 3 5.1 Overview 3 5.2 Security Level 4 5.3 Security Level 4 5.4 Safety Level 3 4 5.5 Security Level 4 5 6 Functional Safety Objective 5 7 Safety requirements 6 7.1 General requirements 6 7.2 Password Module Specification 8 7.3 cryptographic module interface 10 7.4 Roles, Services and Authentication 11 7.5 Software/Firmware Security 14 7.6 Operating Environment 15 7.7 Physical Security 18 7.8 Non-invasive security 24 7.9 Sensitive Security Parameter Management 24 7.10 Self Test 27 7.11 Lifecycle Protection 30 7.12 Mitigation of other attacks 33 Appendix A (Normative) Document Requirements 34 Appendix B (Normative) Password Module Security Policy 39 Appendix C (Normative) Approved Security Features 43 Appendix D (Normative) Approved Sensitive Safety Parameter Generation and Establishment Method 44 Appendix E (Normative Appendix) Approved Identification Mechanism 45 Appendix F (Normative) Non-invasive attacks and mitigation methods detection indicators 46 Reference 47 Foreword This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Data and Communication Protection Research and Education Center of the Chinese Academy of Sciences, Commercial Password Testing Center of the National Cryptography Administration, Beijing Jianqi Intelligent Technology Co., Ltd., Beijing Digital Certification Co., Ltd., Feitian Integrity Technology Co., Ltd., Beijing Haitai Fangyuan Technology Co., Ltd., Beijing Huada Zhibao Electronic System Co., Ltd., Beijing Chuangyuan Tiandi Technology Co., Ltd. The main drafters of this standard. Jing Jiwu, Gao Neng, Tu Chenyang, Zheng Yi, Jiang Weiyu, Zhou Guoliang, Ma Yuan, Liu Zongbin, Liu Zeyi, Wang Wei, Luo Peng, Wang Xuelin, Chen Guo, Zhan Banghua, Zhu Pengfei, Jiang Hongyu, Chen Yue, Zhang Wantao, Liu Limin, Xiang Ji. introduction In information technology, the use of cryptography is increasing, such as the need for data protection to prevent unauthorized disclosure. Or manipulation. The password mechanism can be used to support security services such as entity authentication and non-repudiation. The security and reliability of the password mechanism are directly taken. Depending on the cryptographic module that implements them. This standard proposes four incremental and qualitative security requirements for the cryptographic module, but does not apply correctly to the cryptographic module and the security department. The Department conducts specifications. The operator of the cryptographic module is responsible for ensuring that the security provided by the cryptographic module is full when using or deploying the cryptographic module. Subdivided and acceptable to the information owner, and any residual risk is communicated to the information owner. The operator of the cryptographic module is responsible The cryptographic module that selects the appropriate security level enables the cryptographic module to meet the security requirements of the application and adapt to the security of the environment. status quo. Information Security Technology Password Module Security Requirements 1 Scope This standard specifies the security requirements for the cryptographic module, defines four security levels for the cryptographic module, and gives four security levels, etc. Corresponding requirements of the level. This standard applies to cryptographic modules used in security systems that protect sensitive information in computers and telecommunications systems. This standard is also a password Provide guidance for the design and development of the module, and provide reference for the detection of the security requirements of the cryptographic module. 2 Normative references The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 15843 (all parts) Information technology security technology entity identification GB/T 15852 (all parts) Information Technology Security Technology Message Authentication Code GB/T 17964 information security technology block cipher algorithm working mode GB/T 25069 Information Security Technology Terminology GB/T 32905 information security technology SM3 password hash algorithm GB/T 32907 information security technology SM4 block cipher algorithm GB/T 32918 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Cryptography GB/T 33133.1 Information security technology Zu Chongzhi sequence cipher algorithm Part 1. Algorithm description GM/T 0001.2 Zu Chongzhi sequence cipher algorithm Part 2. Confidentiality algorithm based on Zu Chong algorithm GM/T 0001.3 Zu Chongzhi sequence cipher algorithm Part 3. Integrity algorithm based on Zu Chong algorithm GM/T 0044 (all parts) SM9 identification cipher algorithm 3 Terms and definitions The following terms and definitions as defined in GB/T 25069 apply to this document. 3.1 Certificate certificate A type of data about an entity that is issued by the certificate authority's private key or secret key and cannot be forged. 3.2 Conditional self test conditionalself-test The test performed by the cryptographic module when the specified test conditions occur. 3.3 Critical security parameter criticalsecurityparameter Security-related secret information that is compromised or modified can compromise the security of the cryptographic module. Note. Critical security parameters can be in plain text or encrypted. 3.4 Password boundary cryptographicboundary A well-defined edge that establishes the physical and/or logical boundaries of the cryptographic module and includes all hardware and softness of the cryptographic module. Pieces and/or firmware components. ......

Similar standards: GB/T 36651   GB/T 36644   GB/T 36958   GB/T 37091   GB/T 37090