GM/T 0018-2023 PDF English
US$1865.00 · In stock · Download in 9 secondsGM/T 0018-2023: Interface specifications of cryptography device application Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid GM/T 0018: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0018-2023 | English | 1865 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Interface specifications of cryptography device application
| Valid |
GM/T 0018-2012 | English | 175 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Interface specifications of cryptography device application
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0018-2023
Similar standards GM/T 0010
GM/T 0018-2023: (Cryptozoological device application interface specification)---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0018-2023
GM
CRYPTOGROPHIC INDUSTRY STANDARD
ICS 35.030
CCS L 80
Replacing GM/T 0018-2012
Cryptographic device application interface specification
Issued on: DECEMBER 04, 2023
Implemented on: JUNE 01, 2024
Issued by. State Cryptographic Administration
Table of Contents
Foreword... 3
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms and definitions... 6
4 Abbreviations... 7
5 Algorithm identifier and data structure... 7
5.1 Definition of algorithm identifier... 7
5.2 Definition of basic data type... 7
5.3 Device information definition... 8
5.4 Key classification and storage definition... 9
5.5 Definition of RSA key data structure... 10
5.6 Definition of ECC key data structure... 11
5.7 Definition of ECC encryption data structure... 12
5.8 Definition of ECC signature data structure... 12
5.9 Definition of ECC key pair protection structure... 13
6 Device interface description... 14
6.1 Position of the cryptographic device application interface in the public key
cryptographic infrastructure application technology system framework... 14
6.2 Device management functions... 15
6.3 Key management functions... 18
6.4 Asymmetric algorithm operation class functions... 27
6.5 Symmetric algorithm operation class function... 30
6.6 Hash operation class function... 40
6.7 User file operation class functions... 42
6.8 Verification and debugging functions... 44
Appendix A (Normative) Definition of function return code... 50
Appendix B (Normative) Related data structure and interface function of SM9
algorithm... 52
Appendix C (Normative) VPN device related interface functions... 67
References... 75
Foreword
This document was drafted in accordance with the provisions of GB/T 1.1-2020
"Directives for standardization - Part 1.Rules for the structure and drafting of
standardizing documents".
This document replaces GM/T 0018-2012 "Cryptographic device application interface
specification". Compared with GM/T 0018-2012, in addition to structural adjustments
and editorial changes, the main technical changes are as follows.
a) CHANGE the ECC key pair protection structure (see 5.9; 5.8 of the 2012 edition);
b) DELETE the two interface functions of digital envelope conversion based on RSA
algorithm and digital envelope conversion based on ECC algorithm (see 6.3.7,
6.3.17 of the 2012 edition);
c) ADD 17 interface functions related to multi-packet symmetric encryption and
decryption, multi-packet MAC calculation, single-packet authentic encryption
and decryption, multi-packet authentic encryption and decryption (see 6.5; 6.5 of
the 2012 edition);
d) ADD 3 interface functions related to hashing with keys (see 6.6);
e) ADD the verification and debugging functions (see 6.8);
f) DELETE Chapter 7 "Security requirements" (see Chapter 7 of the 2012 edition);
g) ADD the error codes when user identification does not match (see Appendix A);
h) ADD the definitions of 15 interface functions related to the SM9 identification
cryptographic algorithm and the SM9 identification cryptographic algorithm (see
Appendix B);
i) ADD the definitions of 6 interface functions for calculating IKE working keys,
calculating IPSEC session keys, calculating SSL working keys (see Appendix C).
Please note that some contents of this document may involve patents. The issuing
agency of this document does not assume the responsibility for identifying patents.
This document was proposed by AND shall be under the jurisdiction of the
Cryptography Industry Standardization Technical Committee.
Drafting organizations of this document. China Electronics Technology Network
Security Technology Co., Ltd., Wuxi Jiangnan Information Security Engineering
Technology Center, Sichuan University, Beijing Guomai Information Security
Technology Co., Ltd., Geer Software Co., Ltd., Beijing Digital Certification Co., Ltd.,
Xingtang Communication Technology Co., Ltd., Shandong De'an Information
Cryptographic device application interface specification
1 Scope
This document specifies the algorithm identification, data structure, interface function
of the server-side cryptographic device application interface, under the public key
cryptographic infrastructure application technology system.
This document is applicable to the development and use of server-side cryptographic
devices, as well as application development based on such cryptographic devices.
2 Normative references
The contents of the following documents constitute the essential terms of this document
through normative references in the text. Among them, for referenced documents with
dates, only the versions corresponding to the dates are applicable to this document; for
referenced documents without dates, the latest versions (including all amendments) are
applicable to this document.
GB/T 15852.2 Cybersecurity technology - Message authentication codes (MACs) -
Part 2.Mechanisms using a dedicated hash-function
GB/T 35276 Information security technology - SM2 cryptographic algorithm usage
specification
GB/T 36624 Information technology - Security techniques - Authenticated
encryption
GB/T 38635 (all parts) Information security technology - Identity-based
cryptographic algorithms SM9
GM/T 0006 Cryptographic application identifier criterion specification
GM/T 0022 IPSec VPN technical specification
GM/T 0024 SSL VPN Specification
GM/Z 4001 Cryptographic terminology
3 Terms and definitions
The terms and definitions as defined in GM/Z 4001, as well as the following terms and
definitions, apply to this document.
3.1
Private key access password
Password used to verify the right to use the private key.
3.2
User key
Asymmetric key stored inside the device for application cryptographic operations,
including signature key pairs and encryption key pairs.
4 Abbreviations
The following abbreviations apply to this document.
ECC. Elliptic Curve Cryptography
EPK. External Public Key
IPK. Internal Public Key
ISK. Internal Private Key
KEK. Key Encrypt Key
5 Algorithm identifier and data structure
5.1 Definition of algorithm identifier
The algorithm identifiers of the algorithms used in this document are given in GM/T
0006.The algorithm identifier of the block cipher algorithm includes its working mode.
5.2 Definition of basic data type
The basic data types in this document are stored and exchanged in Big-Endian format.
Table 1 defines the basic data types.
obtain the plaintext of the private key of the ECC key pair.
6 Device interface description
6.1 Position of the cryptographic device application interface in the
public key cryptographic infrastructure application technology system
framework
In the public key cryptographic infrastructure application technology system
framework, the cryptographic device service layer consists of cryptographic machines,
cryptographic cards, intelligent cryptographic terminal devices. It provides basic
cryptographic services to the general cryptographic service layer through the
cryptographic device application interface specified in this document, as shown in
Figure 1.
Basic cryptographic services include key generation, single cryptographic operations,
file management services.
This document uses C language to describe interface functions. Unless otherwise
specified, the length unit of the parameters in the function is the number of bytes.
Cryptographic devices that comply with this document shall support the function
interfaces of the ECC algorithm (ECC in this document specifically refers to the SM2
algorithm), symmetric algorithms, hash operations in this document. All interface
functions listed in this document shall be able to be called arbitrarily by the application
system. Appendix A defines the function return code; Appendix B defines the SM9
algorithm-related data structure and interface functions; Appendix C defines the VPN
device-related interface functions.
When the product supports the SM9 algorithm, the SM9 algorithm-related data
structure and interface functions shall comply with the definition in Appendix B. When
the product supports VPN, the VPN device-related interface functions shall comply
with the definition in Appendix C.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0018-2023 be delivered?Answer: The full copy PDF of English version of GM/T 0018-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0018-2023_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0018-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0018-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds. Question 5: Should I purchase the latest version GM/T 0018-2023?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0018-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
How to buy and download a true PDF of English version of GM/T 0018-2023?A step-by-step guide to download PDF of GM/T 0018-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0018-2023". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|