GM/T 0030-2014 PDF English
US$150.00 · In stock · Download in 9 secondsGM/T 0030-2014: Cryptographic server technical specification Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0030-2014 | English | 150 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cryptographic server technical specification
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0030-2014
GM/T 0030-2014: Cryptographic server technical specification---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0030-2014
GM
CRYPTOGRAPHY INDUSTRYSTANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L80
File No.. 44631-2014
Cryptographic server technical specification
Issued on: FEBRUARY 13, 2014
Implemented on: FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope .. 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 8
5 Functional requirements of cryptographic server .. 8
5.1 Initialization ... 8
5.2 Crypto-operation.. 8
5.3 Key management ... 9
5.4 Random-number generation and test ... 11
5.5 Access control ... 11
5.6 Device management .. 12
5.7 Log audit ... 12
5.8 Equipment self-test.. 12
6 Hardware requirements of cryptographic server ... 12
6.1 External interface ... 12
6.2 Random-number generator ... 13
6.3 Environmental adaptability ... 14
6.4 Reliability ... 14
7 Software requirements of cryptographic server ... 14
7.1 Basic requirements.. 14
7.2 Application program interface (API) ... 15
7.3 Management tool.. 15
8 Security requirements of cryptographic server ... 15
8.1 Cryptographic algorithm ... 15
8.2 Key management ... 15
8.3 System requirements ... 16
8.4 Use requirements ... 16
8.5 Management requirements ... 16
8.6 Physical security protection for equipment ... 17
8.7 Device state ... 17
8.8 Process protection... 17
9 Test requirements of cryptographic server ... 17
9.1 Inspection of appearance and structure ... 17
9.2 Test of submitted documents ... 18
9.3 Function test ... 18
9.4 Performance test .. 21
9.5 Environmental adaptability test ... 23
9.6 Other tests ... 23
10 Qualification evaluation .. 23
Cryptographic server technical specification
1 Scope
This standard defines the relevant terms of cryptographic server, and specifies
other related content of cryptographic server, such as functional requirements,
hardware requirements, software requirements, security requirements and test
requirements.
This standard applies to the development and usage of cryptographic server,
and it can also be used to guide the test of cryptographic server.
2 Normative references
The following documents are essential for the application of this document. For
dated references, only the dated version applies to this document. For undated
references, the latest edition (including all amendments) applies to this
document.
GB/T 9813 Generic specification for microcomputers
GM/T 0005 Randomness test specification
GM/T 0018 Cryptographic equipment application interface specification
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Cryptographic server
It is also known as host encryption server; it is the equipment which can provide
independently or in parallel multiple application entities with cryptographic
service and key management.
3.2
Symmetric cryptographic algorithm
It is a cryptographic algorithm which uses the same key to encrypt and decrypt.
key-pair and encryption key-pair. It is used for device management to represent
the identity of cryptographic server.
Key encryption key. It is symmetric key that is periodically replaced to protect
session key in the case of a pre-assigned key. Cryptographic server may
choose to support key encryption key.
Session key. It is used for data encryption-decryption.
5.3.3 Key generation and installation
Manager key. It is generated or installed by the management tool which is used
in device initialization; it is stored in a secure storage area inside cryptographic
server.
User key. User key consists of signature key and encryption key. Signature key
is generated or installed by cryptographic server; it must support the use of
physical noise source chip to generate, and it must support the use of strong
prime numbers. Encryption key is issued by key management system to the
device; the format for issuing the encryption key follows the rules for the
protection format of the encryption key given in GM/T 0018; and the storage
area for a certain number of user key-pairs must be supported according to the
system requirements. The private key of user key-pairs must support hardware
internal secure storage; it is appropriate to support the security access control
of private key access password.
Device key. Device key consists of signature key and encryption key. Signature
key is generated or installed by using management tool when the device is
initialized; encryption key is issued by key management system to the device.
Device key stores the security storage area inside cryptographic server.
Key encryption key. It is generated or installed by cryptographic equipment
management tool, which must support the generation of physical noise source
chips; the storage area for a certain number of key encryption key must be
supported according to the system requirements; this key must support the
secure storage inside cryptographic server.
Session key. It must support to use the generation of physical noise source
chips to ensure the quality of session key; it must support that one session
replaces one session key. Cryptographic server must not be exported in
plaintext. When session key is stored for a long time, it must support the security
protective measures of user key-pair or key encryption key for encrypted
storage.
5.3.4 Key usage
Symmetric key. According to symmetric key index-number or other key unique
interface, management operations can be carried out, such as key generation,
installation, backup, recovery, and log query.
Management personnel shall be identified into the management interface.
Different management operations shall have different operating authorization.
5.6 Device management
It is appropriate for cryptographic server to have the management function of
accepting management center; the implementation of device management
function shall be carried out according to the requirements of state cryptography
administration competent department.
5.7 Log audit
Cryptographic server shall provide the function of log recording, log viewing and
log exporting.
Log content includes.
a) Administrator operation behavior, including login authentication, system
configuration and key management;
b) Abnormal events, including records of abnormal events, such as
authentication failure and unauthorized access;
c) If it is connected to equipment management center, record the
corresponding operation.
5.8 Equipment self-test
Cryptographic server shall have the function of self-test at power-on and when
receiving self-test command.
Self-test function of equipment shall include the correctness checking of
cryptography algorithm, the test of random-number generator and the test of
storage key and data integrity.
6 Hardware requirements of cryptographic server
6.1 External interface
Cryptographic server shall provide service interface and management interface
respectively.
It supports external RJ-45 Ethernet interface, serial interface, fiber channel,
USB and other hardware interface protocols of current mainstream servers. It
• Test items. Test the collected random-numbers according to the 12 item-
tests of GM/T 0005, except for discrete Fourier test, linear complexity
test, universal statistical test.
• Test-pass standard. If one item fails to pass the standard during the test,
warn that the test is not qualified.
The repetition of random-number collection and test is allowed for only
once; if it is still not qualified through repeated test, determine random-
number generator of products to lose efficacy.
• Test cycle. It is configurable; test interval is at most 12 h.
2) One-time test
• Test quantity. It is determined according to the size of random-number
which is collected in practical application each time, but the length shall
not be less than 128 bits; moreover, the unused sequence that has
passed the test may continue to be used.
• Test items. Poker test. When the sample length is less than 320 bits, the
parameter m = 2.
• Test-pass standard. If one item fails to pass the standard during the test,
warn that the test is not qualified.
The repetition of random-number collection and test is allowed for only
once; if it is still not qualified through repeated test, determine random-
number generator of products to lose efficacy.
6.3 Environmental adaptability
The working environment of cryptographic server shall follow the requirements
about “Climate and Environment Adaptability” in GB/T 9813 according to actual
demand.
6.4 Reliability
The mean time between failures of cryptographic server shall not be less than
10000 h.
7 Software requirements of cryptographic server
7.1 Basic requirements
The underlying s...
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0030-2014 be delivered?Answer: The full copy PDF of English version of GM/T 0030-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0030-2014_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0030-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0030-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0030-2014?A step-by-step guide to download PDF of GM/T 0030-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0030-2014". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|