|
US$489.00 · In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 38644-2020: Information security technology - Trusted computing - Testing method of trusted connect Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 38644-2020 | English | 489 |
Add to Cart
|
5 days [Need to translate]
|
Information security technology - Trusted computing - Testing method of trusted connect
| Valid |
GB/T 38644-2020
|
PDF similar to GB/T 38644-2020
Basic data | Standard ID | GB/T 38644-2020 (GB/T38644-2020) | | Description (Translated English) | Information security technology - Trusted computing - Testing method of trusted connect | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 26,259 | | Date of Issue | 2020-04-28 | | Date of Implementation | 2020-11-01 | | Quoted Standard | GB/T 15843.3; GB/T 20518; GB/T 28455-2012; GB/T 29828-2013; GB/T 32905; GB/T 32907; GB/T 32915; GB/T 32918.1; GB/T 32918.2; GB/T 32918.3; GB/T 32918.4; GB/T 32918.5; GB/T 35276; GM/T 0042-2015; GM/T 0062-2018 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration | | Summary | This standard specifies the test requirements and methods for the trusted network connection protocol and the cryptographic algorithms involved, including the following: a) the compliance test requirements and methods of the protocol interaction mechanism involved in the trusted network connection protocol; b) the trusted network connection The correctness testing requirements and methods for the implementation of cryptographic algorithms involved in the protocol. This standard is applicable to the testing of trusted connection devices conforming to GB/T 29828-2013, and is used to detect whether its cryptographic algorithms and the implementation of the trusted network connection protocol based on the trusted connection architecture TCA meet the requirements. |
GB/T 38644-2020: Information security technology - Trusted computing - Testing method of trusted connect ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Trusted computing--Testing method of trusted connect
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology trusted computing
Trusted connection test method
2020-04-28 release
2020-11-01 implementation
State Administration of Market Supervision and Administration
Issued by the National Standardization Management Committee
Contents
Foreword Ⅲ
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Acronyms 2
5 General requirements 3
5.1 Compliance and interoperability requirements of protocol interaction mechanism 3
5.2 The correctness requirements of cryptographic algorithm implementation 4
6 Overview of test methods 4
6.1 Test equipment 4
6.2 Test topology 4
6.3 Test basis 6
6.4 Test instructions 6
7 Protocol interaction mechanism compliance and interoperability testing methods 6
7.1 Port access control test 6
7.2 TAEP protocol packaging test 8
7.3 TAEPoL protocol packaging test 8
7.4 TCP/UDP port test 8
7.5 Trusted connection architecture test 9
8 The correctness test method of cryptographic algorithm implementation 10
8.1 Symmetric cryptographic algorithm test 10
8.2 Digital signature algorithm test 10
8.3 Key exchange protocol testing 10
8.4 Public key encryption algorithm test 11
8.5 Digital certificate format test 11
8.6 Password hashing algorithm test 11
8.7 Random number test 12
8.8 Algorithm performance test 12
Appendix A (Normative Appendix) New data elements involved in trusted connection architecture testing 13
Appendix B (Normative Appendix) Cryptographic Algorithm Performance Test Method and New Data Elements 17
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted by. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology,
Zhongguancun Wireless Network Security Industry Alliance (WAPI Industry Alliance), Beijing University of Technology, Commercial Password Testing Center of the National Password Administration,
National Information Technology Security Research Center, Beijing Computer Technology and Application Research Institute, China General Technology Research Institute, Tianjin Electromechanical Industry
Product Testing Center, National Radio Monitoring Center Testing Center, China Electronics Technology Group Corporation No. 15 Research Institute, Xi’an University of Posts and Telecommunications, Industrial
And the Broadband Wireless IP Standards Working Group of the Ministry of Information Technology.
The main drafters of this standard. Cao Jun, Li Qin, Du Zhiqiang, Lu Liang, Pan Qi, Lai Yingxu, Huang Zhenhai, Yan Xiang, Wang Guan, Li Dong, Lu Chunmei,
Tie Manxia, Liu Kewei, Liu Jingli, Wang Yuehui, Zhang Guoqiang, Zhang Bianling, Jing Jingtao, Xiong Keqi, Zhao Xiaorong, Luo Peng, Wu Dongyu, Lin Dexin, Peng Xiao,
Fang Hua, Yu Guangming, Zhu Zhengmei, Zheng Dong, Zhao Hui, Wu Dongyu, Zheng Li, Huang Kuigang.
Introduction
GB/T 29828-2013 standardizes the trusted connection architecture based on the ternary peer-to-peer architecture (TrustedConnectArchitecture,
TCA), this standard proposes a set of test requirements and methods for the trusted network connection protocol based on TCA.
The issuer of this document draws attention to the fact that when a declaration conforms to this document, it may involve Chapter 6, Chapter 7, Chapter 8 and
Related patents such as ZL201410255349.X, US15/309,861, JP2016-567036, EP15807391.6, KR10-2016-7034816
usage of.
The issuer of this document has no position on the authenticity, validity and scope of the patent.
The patent holder has assured the issuer of this document that he is willing to work with any applicant under reasonable and non-discriminatory terms and conditions,
Negotiations on patent licensing. The patent holder's statement has been filed with the issuing agency of this document. Relevant information can be contacted through the following
Way to get.
Patent holder. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd.
Address. A201, Qinfengge, Xi'an Software Park, No. 68 Keji 2nd Road, High-tech Zone, Xi'an
Contact. Feng Yuchen
Postcode. 710075
Email. [email protected]
Phone. 029-87607836
Fax. 029-87607829
Please note that in addition to the above patents, some content of this document may still involve patents. The issuer of this document is not responsible for identifying these
Responsibilities.
Information security technology trusted computing
Trusted connection test method
1 Scope
According to GB/T 29828-2013, this standard specifies the test requirements for trusted network connection protocols and the cryptographic algorithms involved and
Methods, including the following.
a) Requirements and methods for compliance testing of protocol interaction mechanisms involved in the trusted network connection protocol;
b) Requirements and methods for correctness testing of cryptographic algorithms involved in the trusted network connection protocol.
This standard is applicable to the testing of trusted connected devices in accordance with GB/T 29828-2013, used to detect its cryptographic algorithm and based on trust
Whether the implementation of TCA's trusted network connection protocol meets the requirements.
2 Normative references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For the cited documents without date, the latest version (including all amendments) applies to this document.
GB/T 15843.3 Information technology security technology entity authentication Part 3. Mechanism using digital signature technology
GB/T 20518 Information Security Technology Public Key Infrastructure Digital Certificate Format
GB/T 28455-2012 Information security technology introduces trusted third-party entity authentication and access architecture specifications
GB/T 29828-2013 Information Security Technology Trusted Computing Specification Trusted Connection Architecture
GB/T 32905 information security technology SM3 password hash algorithm
GB/T 32907 Information Security Technology SM4 Block Cipher Algorithm
GB/T 32915 Information Security Technology Binary Sequence Randomness Detection Method
GB/T 32918 (all parts) Information security technology SM2 elliptic curve public key cryptographic algorithm
GB/T 35276 Information Security Technology SM2 Cryptographic Algorithm Usage Specification
GM/T 0042-2015 ternary peer-to-peer password security protocol test specification
GM/T 0062-2018 Password product random number detection requirements
3 Terms and definitions
The terms and definitions defined in GB/T 29828-2013 and the following apply to this document. For ease of use, the following list is repeated
Some terms and definitions in GB/T 29828-2013.
3.1
Testedequipment
The test object of the trusted network connection protocol is realized.
3.2
Test platform testplatform
Test the trusted network connection protocol, with the ability to test the trusted network connection protocol and the cryptographic algorithms involved, collect and analyze
The platform analyzes and processes the test data, judges the test data according to the requirements of the test specifications, and presents and records the judgment results.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 38644-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 38644-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 38644-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 38644-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|