GM/T 0035.3-2014 PDF English
US$150.00 · In stock · Download in 9 secondsGM/T 0035.3-2014: Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0035.3-2014 | English | 150 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0035.3-2014
GM/T 0035.3-2014: Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0035.3-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Record No.. 44638-2014
Specifications of Cryptographic Application
for RFID Systems – Part 3. Specification of
Cryptographic Application for RFID Reader
Issued on: FEBRUARY 13, 2014
Implemented on: FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative References ... 4
3 Terms and Definitions ... 5
4 Symbols and Abbreviation .. 5
5 Basic Structure of RFID Reader .. 5
6 Cryptographic Security Factor .. 5
6.1 Confidentiality .. 5
6.2 Integrity ... 6
6.3 Non-repudiation .. 7
6.4 ID authentication ... 8
6.5 Access control ... 8
6.6 Audit record .. 8
6.7 Cryptographic configuration ... 9
6.8 Other secure measures ... 9
7 Technical Requirements for Cryptographic Security ... 9
Appendix A (Informative) Application Example for Cryptographic Security of
RFID Reader ... 11
A.1 Security requirements for RFID reader .. 11
A.2 SAM command set ... 12
A.3 Key management ... 13
A.4 Access control .. 16
A.5 Two-way ID authentication between RFID reader and tag ... 18
A.6 Confidentiality and integrity .. 20
A.7 Non-repudiation ... 21
A.8 Communication security between RFID reader and host computer ... 21
Foreword
GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be
divided into 5 parts.
--- Part 1. Cryptographic Protection Framework and Security Levels;
--- Part 2. Specification of Cryptographic Application for RFID tag chip;
--- Part 3. Specification of Cryptographic Application for RFID Reader;
--- Part 4. Specification of Cryptographic Application for Communication between
RFID Tag and Reader;
--- Part 5. Specification for Key Management.
This Part belongs to Part 3 of GM/T 0035.
This Part shall be drafted as per the rules of GB/T 1.1-2009.
This Part was proposed and under the jurisdiction of Cryptographic Industry
Standardization Technical Committee.
Drafting organizations of this Part. Beijing Zhongdian Huada Electronic Design Co.,
Ltd., Shanghai Hsic Application System Co., Ltd., Aisino Co., Ltd., Shanghai Fudan
Microelectronics Group Co., Ltd., Xingtang Communication Technology Co., Ltd.,
Fudan University, Beijing Tongfang Micro-Electronics Co., Ltd., Shanghai Huahong
Integrated Circuit Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd.
Chief drafting staffs of this Part. Dong Haoran, Zhou Jiansuo, Wang Yunsong, Xu
Shumin, Chen Yue, Gu Zhen, Yu Jun, Wu Xingjun, Wang Junfeng, Xie Wenlu, Liang
Shaofeng, Fan Nandi, Wan Junyu, Liu Xun, and Wang Huibo.
Specifications of Cryptographic Application
for RFID Systems – Part 3. Specification of
Cryptographic Application for RFID Reader
1 Scope
This Part of GM/T 0035 specifies the security certification, data storage,
communication security and the like security requirements of RFID reader adopted
cryptographic technology; specifies the technical requirements of RFID system at
different security levels against the cryptographic security of RFID reader. Appendix A
gives an example of a RFID reader cryptographic security application.
This Part is applicable to the design, development, manufacture and application of
RFID reader adopted cryptographic technology.
2 Normative References
The following documents are essential to the application of this document. For the
dated documents, only the versions with the dates indicated are applicable to this
document; for the undated documents, only the latest version (including all the
amendments) are applicable to this document.
GM/T 0035.1-2014 Specifications of Cryptographic Application for RFID Systems.
Part 1. Cryptographic Protection Framework and Security Levels
GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems –
Part 2. Specification of Cryptographic Application for RFID Tag Chip
GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems -
Part 4. Specification of Cryptographic Application for Communication between RFID
Tag and Reader
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems -
Part 5. Specification for Key Management
The RFID reader performs encryption protection by using cryptographic algorithm
against the sensitive information in the RFID reader; so that the damage, failure or
unauthorized access of any part of the RFID reader shall not cause the leakage of the
sensitive information; so that ensure the confidentiality of data storage in RFID reader.
The confidentiality protection of storage information shall be finished through the
encryption of cryptographic algorithm.
When adopting the block encryption of symmetric cryptographic algorithm, use LD to
indicate the length of plaintext data; generate new data block by adding LD before the
plaintext data; such data block shall be grouped as per the block length of the
cryptographic algorithm; if the length of the final block of data is less than the block
length of cryptographic algorithm, it shall be filled and supplemented. The filling mode
shall be filling one byte of hexadecimal system ‘80’ behind the final block of data; if it
is still less than the block length of cryptographic algorithm, then fill the ‘00’ till the block
length. After the data is grouped, use cryptographic algorithm and encrypted key to
encrypt such data block by block then store them. When reading such data, use the
same cryptographic algorithm and encrypted key to decrypt such stored ciphertext
data; and intersect to obtain the intact plaintext data according to the plaintext data
length LD.
6.1.2 Confidentiality of transmission data
When performing communication between RFID reader and tag, the RFID reader shall
perform encrypted protection against the transmitted sensitive information by
cryptographic algorithm; ensure after such transmitted data is intersected, the plaintext
data can’t be obtained; so as to meet the confidentiality requirements of transmission
data.
The confidentiality protection of transmission data shall be finished through encrypting
the transmitted plaintext data; the stream encryption or block encryption modes shall
be adopted.
The realization process for the confidentiality of transmission data shall refer to GM/T
0035.4-2014.
6.2 Integrity
6.2.1 Integrity of storage information
The RFID reader performs verification and calculation against the sensitive information
stored in the RFID reader by cryptographic algorithm; so that find whether the data has
been tampered, deleted and inserted, etc.; ensure the integrity of storage information.
The integrity protection of storage information shall adopt cryptographic algorithm;
which is performed through adding check code to the storage information. The specific
32KB EEPROM. used for the storage of data and programs
256KB FLASH. used for the storage of programs, function libraries and data
MMU. memory management unit, which supports 4 operating modes
Random number generator
Security detection. detection of high-and-low frequency; detection of high-and-low
voltage
UART interface
Support the SM1/SM4, SM2, SM3, SM7 cryptographic algorithms
A.1.2 Security levels
The security level of RFID system is Level-2.
The function of RFID tag is the same as the Appendix A in GM/T 0035.2-2014; support
the domestic SM7 cryptographic algorithm.
A.1.3 Cryptographic security requirements for RFID reader
According to the security requirements for system, the RFID reader supports the
following security elements.
a) Confidentiality of storage information;
b) integrity of storage information;
c) Confidentiality of transmission information with RFID tag;
d) Origin non-repudiation of RFID tag;
e) Two-way challenge response ID authentication between RFID reader and tag;
f) Access control.
In addition, the RFID reader supports the confidentiality and integrity of transmission
information with the host computer, ID authentication, access control, non-repudiation,
and the like security elements.
A.2 SAM command set
The instructions for the command set supported by SAM can refer to Table A.1.
event
NOTE. the cipher machine indicates the cryptographic device adopted by the host computer when
ensuring the key generation, ticket issuing, communication security between the host computer
and RFID reader.
A.3.3 Key entry
The distribution and entry of RFID reader key shall be performed in the key
management center; according to the different applications of the RFID reader,
different keys are entered into the RFID reader; enter 3 keys into the ticket-verifying
reader in this application, which include SM1/SM4 Key KB of the ticket-verifying key
o...
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0035.3-2014 be delivered?Answer: The full copy PDF of English version of GM/T 0035.3-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0035.3-2014_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0035.3-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0035.3-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0035.3-2014?A step-by-step guide to download PDF of GM/T 0035.3-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0035.3-2014". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|