HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (22 Mar 2025)

GM/T 0017-2023 English PDF (GM/T 0017-2012: Older version)

Search result: GM/T 0017-2023 (GM/T 0017-2012 Older version)
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GM/T 0017-2023English5669 Add to Cart 19 days [Need to translate] Smart token cryptography application interface data format specification Valid GM/T 0017-2023
GM/T 0017-2012English630 Add to Cart 0--9 seconds. Auto-delivery Smart token cryptography application interface data format specification Obsolete GM/T 0017-2012


BASIC DATA
Standard ID GM/T 0017-2023 (GM/T0017-2023)
Description (Translated English) (Smart Password Key Password Application Interface Data Format Specification)
Sector / Industry Chinese Industry Standard (Recommended)
Word Count Estimation 228,244
Date of Issue 2023-12-04
Date of Implementation 2024-06-01


GM/T 0017-2012 GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 File No.. 38315-2013 Smart token cryptography application interface data format specification ISSUED ON. NOVEMBER 22, 2012 IMPLEMENTED ON. NOVEMBER 22, 2012 Issued by. State Cryptography Administration Table of Contents Foreword ... 4  Introduction .. 5  1 Scope .. 6  2 Normative references ... 6  3 Terms and definitions ... 6  4 Abbreviations .. 9  5 Mark .. 10  6 Structural model ... 11  7 APDU message structure ... 11  7.1 Overview ... 11  7.2 Command APDU .. 12  7.3 Command body encoding conventions ... 13  7.4 Response APDU ... 15  8 Coding conversion of command header, data fields, and response status words ... 15  8.1 Overview ... 15  8.2 CLA (class) bytes .. 16  8.3 INS (instruction) byte .. 16  8.4 Parameter bytes ... 18  8.5 Data field bytes .. 18  8.6 Status byte ... 19  9 APDU instruction ... 21  9.1 Device management instructions ... 21  9.2 Access control instructions ... 26  9.3 Application management instructions .. 34  9.4 File management instructions ... 40  9.5 Container management instructions ... 47  9.6 Cryptography service instructions ... 56  10 Device protocol .. 108  10.1 Overview .. 108  10.2 Device identification mechanism ... 108  10.3 CCID protocol ... 108  10.4 USB Mass Storage protocol extension .. 108  10.5 HID protocol extension ... 112  Appendix A (Normative) Device return code definition and description .. 119  Appendix B (Normative) Security message calculation descriptions ... 121  Appendix C (Informative) Programming paradigm ... 123  Foreword This Standard was drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights. Appendix A and Appendix B of this standard are normative, Appendix C is informative. This Standard was proposed by and shall be under the jurisdiction of Code Industry Standardization Technical Committee. Main drafting organizations of this Standard. Beijing Jiangnan Tian’an Technology Co., Ltd., Beijing Woqi Smart Technology Co., Ltd., Beijing Feitian Integrity Technology Co., Ltd., Beijing Tiandirong Technology Co., Ltd., Hublot Co., Ltd., Beijing Digital Certificate Authentication Center Ltd., Beijing Tianwei Integrity E-commerce Services Ltd., Beijing Guofuan E-commerce Security Authentication Co., Ltd. Participating drafting organizations of this Standard. Beijing Haitai Fangyuan Technology Co., Ltd., Beijing Huada Zhibao Electronic Systems Co., Ltd., Beijing Daming Wuzhou Technology Co., Ltd., Banknote Credit Card Industry Development Co., Ltd., Beijing Huahong IC Design Co., Ltd., Beijing Xuanji Information Technology Co., Ltd., Beijing Chuangyuan Tiandi Technology Co., Ltd., China Railway Xin’an (Beijing) Information Security Technology Co., Ltd., Beijing Tiancheng Shengye Technology Co., Ltd., Oriental Port Technology Co., Ltd., Geer Century Smart Card Technology Co., Ltd., Beijing Yongxin Shibo Digital TV Technology Co., Ltd., Jida Zhengyuan Information Technology Co., Ltd., Shenzhen Wendingchuang Data Technology Co., Ltd., Wuhan Tianyu Information Industry Co., Ltd. The main drafters of this standard. Liu Ping, Wang Yanping, Li Shaoxiong, Liu Bo, Li Qing, Deng Xiaosi, Wang Xuelin, Li Guo, Hu Yanfen, Zhu Pengfei, Zhao Liming, Feng Chengyong, Zhang Haisong, Fu Wei. Smart token cryptography application interface data format specification 1 Scope This standard specifies the PKI cryptographic system-based smart token application interface data format, provides the interface-related data types, format, definition and description of parameters, security requirements. This standard applies to the development, use and testing of smart token products. 2 Normative references The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GM/T 0005 Randomness test specification GM/T 0006 Cryptographic application identifier criterion specification GM/T 0009 SM2 Cryptography Algorithm Application Specification GM/T 0016-2012 Smart token cryptography application interface specification ISO 7816-4 Identification cards - Integrated circuit cards with contacts - Part 4. Organization, security and exchange of commands PKCS # 1 - RSA Labs, RSA encryption standard, v2.1, 2002.7 Specification for Integrated Circuit Cards Interface Devices, Revision 1.1, 3 Terms and definitions The following terms and definitions apply to this document. 3.1 3.9 Application A structure containing containers, device authentication key and file, with independent permission management. 3.10 Container The unique storage space in the cryptographic device divided for the storage of key. 3.11 Device authentication Authentication of the application by the smart token. 3.12 Device authentication key The key used for device authentication. 3.13 Device label Another name of device, which can be set by the user and stored inside the device. 3.14 SM1 algorithm A group encryption algorithm, with a group length of 128 bits and a key length of 128 bits. 3.15 SM2 algorithm An elliptic curve cryptography algorithm, with a key length of 256 bits. 3.16 SM3 algorithm communication with the smart card through the interface complying with 7816 standard protocol; UMS. USB Mass Storage, commonly used for peripherals such as U-disc and mobile hard disc; APDU. Application Protocol Data Unit CLA. Class Type of APDU; INS. Instruction byte of Command Message of APDU; P1. Parameter 1 in APDU Command Head; P2. Parameter 2 in APDU Command Head; Lc. Message data field length of APDU command; Le. Expected return data of APDU command; SW1. Returned Status Word One of APDU command; SW2. Returned Status Word Two of APDU command; RFU. Reserved for Future Use. 5 Mark The following notation applies to this document. “0” to “9” and “A” to “F” indicate the hexadecimal number; (B1) represents the value of the byte (B1); B1 II B2 represent the concatenation of byte B1 (most significant byte) and B2 (least significant byte); (B1 II B2) represents the concatenation of byte B1 and B2; 0x000 ~ 0x0F represent hexadecimal number; XX represents a 1-byte hexadecimal number; XXXX represents a 2-byte hexadecimal number; XX...XX represents a 2-byte hexadecimal number; # represents number. 9.6.28.1 Definition and scope The DecryptUpdate command is used to decrypt multiple groups of data. 9.6.28.2 Precautions The Decryptlnit command needs to be downloaded before downloading the DecryptUpdate command. If the Decrypt command or DecryptFinal command of the same key has been downloaded after downloading the Decryptlnit command, it requires to re-download the DecryptInit command. The length of the data to be decrypted must be an integral multiple of the group length, the device does not perform bit padding operation for the group data. 9.6.28.3 Command message See Table 164. Table 164 -- DecryptUpdate command message encoding Code Length, byte Value, Hex Descriptions CLA 1 80 - INS 1 B0 - P1 1 00 - P2 1 00 - Lc 3 00XXXX Data field length DATA Lc XXXXXX Application ID (2 bytes) + container ID (2 bytes) + key ID (2 bytes) + group data to be decrypted Le 2 XXXX Data length expected to be sent bank. 0 indicates sending back the data of actual length 9.6.28.4 Command message data field Command message data field consists of application ID, container ID, key ID and group data to be decrypted. 9.6.28.5 Response message data field The response message data field is the decrypted data of the expected length. 9.6.28.6 Response message status code The status codes that the smart token may send back are shown in Table 165. Table 165 -- EncryptUpdate command response status code SW1 SW2 Meanings 90 00 Executed correctly 6A 8D Cited symmetric key not existed 67 00 Lc error 90 00 Executed correctly 6A 8D Data error 67 00 Lc error 69 85 Usage conditions not satisfied 6A 88 Cited application not existed 6A 94 Cited container not existed 6A 8C Cited symmetric key not existed 9.6.30 DigestInit (cryptographic hash initialization) 9.6.30.1 Definitions and scope DigestInit is used to initialize the cryptographic hashing operation, and to specify the algorithm to calculating the cryptographic hash. 9.6.30.2 Precautions This command can be executed at any time... ......

Similar standards: GM/T 0017-2012  GM/T 0009-2023  GM/T 0010-2023  
Similar PDFs (Auto-delivered in 9 seconds): GM/T 0017-2012