HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0030-2014 PDF English

US$150.00 · In stock · Download in 9 seconds
GM/T 0030-2014: Cryptographic server technical specification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0030-2014English150 Add to Cart 0-9 seconds. Auto-delivery Cryptographic server technical specification Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0030-2014
      

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0021   

GM/T 0030-2014: Cryptographic server technical specification

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0030-2014
GM CRYPTOGRAPHY INDUSTRYSTANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L80 File No.. 44631-2014 Cryptographic server technical specification Issued on: FEBRUARY 13, 2014 Implemented on: FEBRUARY 13, 2014 Issued by. State Cryptography Administration

Table of Contents

Foreword ... 4 1 Scope .. 5 2 Normative references ... 5 3 Terms and definitions ... 5 4 Symbols and abbreviations ... 8 5 Functional requirements of cryptographic server .. 8 5.1 Initialization ... 8 5.2 Crypto-operation.. 8 5.3 Key management ... 9 5.4 Random-number generation and test ... 11 5.5 Access control ... 11 5.6 Device management .. 12 5.7 Log audit ... 12 5.8 Equipment self-test.. 12 6 Hardware requirements of cryptographic server ... 12 6.1 External interface ... 12 6.2 Random-number generator ... 13 6.3 Environmental adaptability ... 14 6.4 Reliability ... 14 7 Software requirements of cryptographic server ... 14 7.1 Basic requirements.. 14 7.2 Application program interface (API) ... 15 7.3 Management tool.. 15 8 Security requirements of cryptographic server ... 15 8.1 Cryptographic algorithm ... 15 8.2 Key management ... 15 8.3 System requirements ... 16 8.4 Use requirements ... 16 8.5 Management requirements ... 16 8.6 Physical security protection for equipment ... 17 8.7 Device state ... 17 8.8 Process protection... 17 9 Test requirements of cryptographic server ... 17 9.1 Inspection of appearance and structure ... 17 9.2 Test of submitted documents ... 18 9.3 Function test ... 18 9.4 Performance test .. 21 9.5 Environmental adaptability test ... 23 9.6 Other tests ... 23 10 Qualification evaluation .. 23 Cryptographic server technical specification

1 Scope

This standard defines the relevant terms of cryptographic server, and specifies other related content of cryptographic server, such as functional requirements, hardware requirements, software requirements, security requirements and test requirements. This standard applies to the development and usage of cryptographic server, and it can also be used to guide the test of cryptographic server.

2 Normative references

The following documents are essential for the application of this document. For dated references, only the dated version applies to this document. For undated references, the latest edition (including all amendments) applies to this document. GB/T 9813 Generic specification for microcomputers GM/T 0005 Randomness test specification GM/T 0018 Cryptographic equipment application interface specification

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Cryptographic server It is also known as host encryption server; it is the equipment which can provide independently or in parallel multiple application entities with cryptographic service and key management. 3.2 Symmetric cryptographic algorithm It is a cryptographic algorithm which uses the same key to encrypt and decrypt. key-pair and encryption key-pair. It is used for device management to represent the identity of cryptographic server. Key encryption key. It is symmetric key that is periodically replaced to protect session key in the case of a pre-assigned key. Cryptographic server may choose to support key encryption key. Session key. It is used for data encryption-decryption. 5.3.3 Key generation and installation Manager key. It is generated or installed by the management tool which is used in device initialization; it is stored in a secure storage area inside cryptographic server. User key. User key consists of signature key and encryption key. Signature key is generated or installed by cryptographic server; it must support the use of physical noise source chip to generate, and it must support the use of strong prime numbers. Encryption key is issued by key management system to the device; the format for issuing the encryption key follows the rules for the protection format of the encryption key given in GM/T 0018; and the storage area for a certain number of user key-pairs must be supported according to the system requirements. The private key of user key-pairs must support hardware internal secure storage; it is appropriate to support the security access control of private key access password. Device key. Device key consists of signature key and encryption key. Signature key is generated or installed by using management tool when the device is initialized; encryption key is issued by key management system to the device. Device key stores the security storage area inside cryptographic server. Key encryption key. It is generated or installed by cryptographic equipment management tool, which must support the generation of physical noise source chips; the storage area for a certain number of key encryption key must be supported according to the system requirements; this key must support the secure storage inside cryptographic server. Session key. It must support to use the generation of physical noise source chips to ensure the quality of session key; it must support that one session replaces one session key. Cryptographic server must not be exported in plaintext. When session key is stored for a long time, it must support the security protective measures of user key-pair or key encryption key for encrypted storage. 5.3.4 Key usage Symmetric key. According to symmetric key index-number or other key unique interface, management operations can be carried out, such as key generation, installation, backup, recovery, and log query. Management personnel shall be identified into the management interface. Different management operations shall have different operating authorization. 5.6 Device management It is appropriate for cryptographic server to have the management function of accepting management center; the implementation of device management function shall be carried out according to the requirements of state cryptography administration competent department. 5.7 Log audit Cryptographic server shall provide the function of log recording, log viewing and log exporting. Log content includes. a) Administrator operation behavior, including login authentication, system configuration and key management; b) Abnormal events, including records of abnormal events, such as authentication failure and unauthorized access; c) If it is connected to equipment management center, record the corresponding operation. 5.8 Equipment self-test Cryptographic server shall have the function of self-test at power-on and when receiving self-test command. Self-test function of equipment shall include the correctness checking of cryptography algorithm, the test of random-number generator and the test of storage key and data integrity.

6 Hardware requirements of cryptographic server

6.1 External interface Cryptographic server shall provide service interface and management interface respectively. It supports external RJ-45 Ethernet interface, serial interface, fiber channel, USB and other hardware interface protocols of current mainstream servers. It • Test items. Test the collected random-numbers according to the 12 item- tests of GM/T 0005, except for discrete Fourier test, linear complexity test, universal statistical test. • Test-pass standard. If one item fails to pass the standard during the test, warn that the test is not qualified. The repetition of random-number collection and test is allowed for only once; if it is still not qualified through repeated test, determine random- number generator of products to lose efficacy. • Test cycle. It is configurable; test interval is at most 12 h. 2) One-time test • Test quantity. It is determined according to the size of random-number which is collected in practical application each time, but the length shall not be less than 128 bits; moreover, the unused sequence that has passed the test may continue to be used. • Test items. Poker test. When the sample length is less than 320 bits, the parameter m = 2. • Test-pass standard. If one item fails to pass the standard during the test, warn that the test is not qualified. The repetition of random-number collection and test is allowed for only once; if it is still not qualified through repeated test, determine random- number generator of products to lose efficacy. 6.3 Environmental adaptability The working environment of cryptographic server shall follow the requirements about “Climate and Environment Adaptability” in GB/T 9813 according to actual demand. 6.4 Reliability The mean time between failures of cryptographic server shall not be less than 10000 h.

7 Software requirements of cryptographic server

7.1 Basic requirements The underlying s... ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0030-2014 be delivered?

Answer: The full copy PDF of English version of GM/T 0030-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0030-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0030-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0030-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0030-2014?

A step-by-step guide to download PDF of GM/T 0030-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0030-2014".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9