HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0018-2023 PDF English

US$1865.00 · In stock · Download in 9 seconds
GM/T 0018-2023: Interface specifications of cryptography device application
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GM/T 0018: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0018-2023English1865 Add to Cart 0-9 seconds. Auto-delivery Interface specifications of cryptography device application Valid
GM/T 0018-2012English175 Add to Cart 0-9 seconds. Auto-delivery Interface specifications of cryptography device application Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0018-2023
      

Similar standards

GM/T 0010   

GM/T 0018-2023: (Cryptozoological device application interface specification)

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0018-2023
GM CRYPTOGROPHIC INDUSTRY STANDARD ICS 35.030 CCS L 80 Replacing GM/T 0018-2012 Cryptographic device application interface specification Issued on: DECEMBER 04, 2023 Implemented on: JUNE 01, 2024 Issued by. State Cryptographic Administration

Table of Contents

Foreword... 3 Introduction... 5 1 Scope... 6 2 Normative references... 6 3 Terms and definitions... 6 4 Abbreviations... 7 5 Algorithm identifier and data structure... 7 5.1 Definition of algorithm identifier... 7 5.2 Definition of basic data type... 7 5.3 Device information definition... 8 5.4 Key classification and storage definition... 9 5.5 Definition of RSA key data structure... 10 5.6 Definition of ECC key data structure... 11 5.7 Definition of ECC encryption data structure... 12 5.8 Definition of ECC signature data structure... 12 5.9 Definition of ECC key pair protection structure... 13 6 Device interface description... 14 6.1 Position of the cryptographic device application interface in the public key cryptographic infrastructure application technology system framework... 14 6.2 Device management functions... 15 6.3 Key management functions... 18 6.4 Asymmetric algorithm operation class functions... 27 6.5 Symmetric algorithm operation class function... 30 6.6 Hash operation class function... 40 6.7 User file operation class functions... 42 6.8 Verification and debugging functions... 44 Appendix A (Normative) Definition of function return code... 50 Appendix B (Normative) Related data structure and interface function of SM9 algorithm... 52 Appendix C (Normative) VPN device related interface functions... 67 References... 75

Foreword

This document was drafted in accordance with the provisions of GB/T 1.1-2020 "Directives for standardization - Part 1.Rules for the structure and drafting of standardizing documents". This document replaces GM/T 0018-2012 "Cryptographic device application interface specification". Compared with GM/T 0018-2012, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) CHANGE the ECC key pair protection structure (see 5.9; 5.8 of the 2012 edition); b) DELETE the two interface functions of digital envelope conversion based on RSA algorithm and digital envelope conversion based on ECC algorithm (see 6.3.7, 6.3.17 of the 2012 edition); c) ADD 17 interface functions related to multi-packet symmetric encryption and decryption, multi-packet MAC calculation, single-packet authentic encryption and decryption, multi-packet authentic encryption and decryption (see 6.5; 6.5 of the 2012 edition); d) ADD 3 interface functions related to hashing with keys (see 6.6); e) ADD the verification and debugging functions (see 6.8); f) DELETE Chapter 7 "Security requirements" (see Chapter 7 of the 2012 edition); g) ADD the error codes when user identification does not match (see Appendix A); h) ADD the definitions of 15 interface functions related to the SM9 identification cryptographic algorithm and the SM9 identification cryptographic algorithm (see Appendix B); i) ADD the definitions of 6 interface functions for calculating IKE working keys, calculating IPSEC session keys, calculating SSL working keys (see Appendix C). Please note that some contents of this document may involve patents. The issuing agency of this document does not assume the responsibility for identifying patents. This document was proposed by AND shall be under the jurisdiction of the Cryptography Industry Standardization Technical Committee. Drafting organizations of this document. China Electronics Technology Network Security Technology Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, Sichuan University, Beijing Guomai Information Security Technology Co., Ltd., Geer Software Co., Ltd., Beijing Digital Certification Co., Ltd., Xingtang Communication Technology Co., Ltd., Shandong De'an Information Cryptographic device application interface specification

1 Scope

This document specifies the algorithm identification, data structure, interface function of the server-side cryptographic device application interface, under the public key cryptographic infrastructure application technology system. This document is applicable to the development and use of server-side cryptographic devices, as well as application development based on such cryptographic devices.

2 Normative references

The contents of the following documents constitute the essential terms of this document through normative references in the text. Among them, for referenced documents with dates, only the versions corresponding to the dates are applicable to this document; for referenced documents without dates, the latest versions (including all amendments) are applicable to this document. GB/T 15852.2 Cybersecurity technology - Message authentication codes (MACs) - Part 2.Mechanisms using a dedicated hash-function GB/T 35276 Information security technology - SM2 cryptographic algorithm usage specification GB/T 36624 Information technology - Security techniques - Authenticated encryption GB/T 38635 (all parts) Information security technology - Identity-based cryptographic algorithms SM9 GM/T 0006 Cryptographic application identifier criterion specification GM/T 0022 IPSec VPN technical specification GM/T 0024 SSL VPN Specification GM/Z 4001 Cryptographic terminology

3 Terms and definitions

The terms and definitions as defined in GM/Z 4001, as well as the following terms and definitions, apply to this document. 3.1 Private key access password Password used to verify the right to use the private key. 3.2 User key Asymmetric key stored inside the device for application cryptographic operations, including signature key pairs and encryption key pairs.

4 Abbreviations

The following abbreviations apply to this document. ECC. Elliptic Curve Cryptography EPK. External Public Key IPK. Internal Public Key ISK. Internal Private Key KEK. Key Encrypt Key

5 Algorithm identifier and data structure

5.1 Definition of algorithm identifier The algorithm identifiers of the algorithms used in this document are given in GM/T 0006.The algorithm identifier of the block cipher algorithm includes its working mode. 5.2 Definition of basic data type The basic data types in this document are stored and exchanged in Big-Endian format. Table 1 defines the basic data types. obtain the plaintext of the private key of the ECC key pair.

6 Device interface description

6.1 Position of the cryptographic device application interface in the public key cryptographic infrastructure application technology system framework In the public key cryptographic infrastructure application technology system framework, the cryptographic device service layer consists of cryptographic machines, cryptographic cards, intelligent cryptographic terminal devices. It provides basic cryptographic services to the general cryptographic service layer through the cryptographic device application interface specified in this document, as shown in Figure 1. Basic cryptographic services include key generation, single cryptographic operations, file management services. This document uses C language to describe interface functions. Unless otherwise specified, the length unit of the parameters in the function is the number of bytes. Cryptographic devices that comply with this document shall support the function interfaces of the ECC algorithm (ECC in this document specifically refers to the SM2 algorithm), symmetric algorithms, hash operations in this document. All interface functions listed in this document shall be able to be called arbitrarily by the application system. Appendix A defines the function return code; Appendix B defines the SM9 algorithm-related data structure and interface functions; Appendix C defines the VPN device-related interface functions. When the product supports the SM9 algorithm, the SM9 algorithm-related data structure and interface functions shall comply with the definition in Appendix B. When the product supports VPN, the VPN device-related interface functions shall comply with the definition in Appendix C. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0018-2023 be delivered?

Answer: The full copy PDF of English version of GM/T 0018-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0018-2023_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0018-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0018-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

Question 5: Should I purchase the latest version GM/T 0018-2023?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0018-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

How to buy and download a true PDF of English version of GM/T 0018-2023?

A step-by-step guide to download PDF of GM/T 0018-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0018-2023".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9