HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0035.3-2014 PDF English

US$150.00 · In stock · Download in 9 seconds
GM/T 0035.3-2014: Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0035.3-2014English150 Add to Cart 0-9 seconds. Auto-delivery Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0035.3-2014
      

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0035.2   

GM/T 0035.3-2014: Specifications of Cryptographic Application for RFID Systems - Part 3: Specification of Cryptographic Application for RFID Reader


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0035.3-2014
GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Record No.. 44638-2014 Specifications of Cryptographic Application for RFID Systems – Part 3. Specification of Cryptographic Application for RFID Reader Issued on: FEBRUARY 13, 2014 Implemented on: FEBRUARY 13, 2014 Issued by. State Cryptography Administration

Table of Contents

Foreword ... 3 1 Scope .. 4 2 Normative References ... 4 3 Terms and Definitions ... 5 4 Symbols and Abbreviation .. 5 5 Basic Structure of RFID Reader .. 5 6 Cryptographic Security Factor .. 5 6.1 Confidentiality .. 5 6.2 Integrity ... 6 6.3 Non-repudiation .. 7 6.4 ID authentication ... 8 6.5 Access control ... 8 6.6 Audit record .. 8 6.7 Cryptographic configuration ... 9 6.8 Other secure measures ... 9 7 Technical Requirements for Cryptographic Security ... 9 Appendix A (Informative) Application Example for Cryptographic Security of RFID Reader ... 11 A.1 Security requirements for RFID reader .. 11 A.2 SAM command set ... 12 A.3 Key management ... 13 A.4 Access control .. 16 A.5 Two-way ID authentication between RFID reader and tag ... 18 A.6 Confidentiality and integrity .. 20 A.7 Non-repudiation ... 21 A.8 Communication security between RFID reader and host computer ... 21

Foreword

GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be divided into 5 parts. --- Part 1. Cryptographic Protection Framework and Security Levels; --- Part 2. Specification of Cryptographic Application for RFID tag chip; --- Part 3. Specification of Cryptographic Application for RFID Reader; --- Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader; --- Part 5. Specification for Key Management. This Part belongs to Part 3 of GM/T 0035. This Part shall be drafted as per the rules of GB/T 1.1-2009. This Part was proposed and under the jurisdiction of Cryptographic Industry Standardization Technical Committee. Drafting organizations of this Part. Beijing Zhongdian Huada Electronic Design Co., Ltd., Shanghai Hsic Application System Co., Ltd., Aisino Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Xingtang Communication Technology Co., Ltd., Fudan University, Beijing Tongfang Micro-Electronics Co., Ltd., Shanghai Huahong Integrated Circuit Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd. Chief drafting staffs of this Part. Dong Haoran, Zhou Jiansuo, Wang Yunsong, Xu Shumin, Chen Yue, Gu Zhen, Yu Jun, Wu Xingjun, Wang Junfeng, Xie Wenlu, Liang Shaofeng, Fan Nandi, Wan Junyu, Liu Xun, and Wang Huibo. Specifications of Cryptographic Application for RFID Systems – Part 3. Specification of Cryptographic Application for RFID Reader

1 Scope

This Part of GM/T 0035 specifies the security certification, data storage, communication security and the like security requirements of RFID reader adopted cryptographic technology; specifies the technical requirements of RFID system at different security levels against the cryptographic security of RFID reader. Appendix A gives an example of a RFID reader cryptographic security application. This Part is applicable to the design, development, manufacture and application of RFID reader adopted cryptographic technology.

2 Normative References

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this document. GM/T 0035.1-2014 Specifications of Cryptographic Application for RFID Systems. Part 1. Cryptographic Protection Framework and Security Levels GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems – Part 2. Specification of Cryptographic Application for RFID Tag Chip GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems - Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems - Part 5. Specification for Key Management The RFID reader performs encryption protection by using cryptographic algorithm against the sensitive information in the RFID reader; so that the damage, failure or unauthorized access of any part of the RFID reader shall not cause the leakage of the sensitive information; so that ensure the confidentiality of data storage in RFID reader. The confidentiality protection of storage information shall be finished through the encryption of cryptographic algorithm. When adopting the block encryption of symmetric cryptographic algorithm, use LD to indicate the length of plaintext data; generate new data block by adding LD before the plaintext data; such data block shall be grouped as per the block length of the cryptographic algorithm; if the length of the final block of data is less than the block length of cryptographic algorithm, it shall be filled and supplemented. The filling mode shall be filling one byte of hexadecimal system ‘80’ behind the final block of data; if it is still less than the block length of cryptographic algorithm, then fill the ‘00’ till the block length. After the data is grouped, use cryptographic algorithm and encrypted key to encrypt such data block by block then store them. When reading such data, use the same cryptographic algorithm and encrypted key to decrypt such stored ciphertext data; and intersect to obtain the intact plaintext data according to the plaintext data length LD. 6.1.2 Confidentiality of transmission data When performing communication between RFID reader and tag, the RFID reader shall perform encrypted protection against the transmitted sensitive information by cryptographic algorithm; ensure after such transmitted data is intersected, the plaintext data can’t be obtained; so as to meet the confidentiality requirements of transmission data. The confidentiality protection of transmission data shall be finished through encrypting the transmitted plaintext data; the stream encryption or block encryption modes shall be adopted. The realization process for the confidentiality of transmission data shall refer to GM/T 0035.4-2014. 6.2 Integrity 6.2.1 Integrity of storage information The RFID reader performs verification and calculation against the sensitive information stored in the RFID reader by cryptographic algorithm; so that find whether the data has been tampered, deleted and inserted, etc.; ensure the integrity of storage information. The integrity protection of storage information shall adopt cryptographic algorithm; which is performed through adding check code to the storage information. The specific  32KB EEPROM. used for the storage of data and programs  256KB FLASH. used for the storage of programs, function libraries and data  MMU. memory management unit, which supports 4 operating modes  Random number generator  Security detection. detection of high-and-low frequency; detection of high-and-low voltage  UART interface  Support the SM1/SM4, SM2, SM3, SM7 cryptographic algorithms A.1.2 Security levels The security level of RFID system is Level-2. The function of RFID tag is the same as the Appendix A in GM/T 0035.2-2014; support the domestic SM7 cryptographic algorithm. A.1.3 Cryptographic security requirements for RFID reader According to the security requirements for system, the RFID reader supports the following security elements. a) Confidentiality of storage information; b) integrity of storage information; c) Confidentiality of transmission information with RFID tag; d) Origin non-repudiation of RFID tag; e) Two-way challenge response ID authentication between RFID reader and tag; f) Access control. In addition, the RFID reader supports the confidentiality and integrity of transmission information with the host computer, ID authentication, access control, non-repudiation, and the like security elements. A.2 SAM command set The instructions for the command set supported by SAM can refer to Table A.1. event NOTE. the cipher machine indicates the cryptographic device adopted by the host computer when ensuring the key generation, ticket issuing, communication security between the host computer and RFID reader. A.3.3 Key entry The distribution and entry of RFID reader key shall be performed in the key management center; according to the different applications of the RFID reader, different keys are entered into the RFID reader; enter 3 keys into the ticket-verifying reader in this application, which include SM1/SM4 Key KB of the ticket-verifying key o... ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0035.3-2014 be delivered?

Answer: The full copy PDF of English version of GM/T 0035.3-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0035.3-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0035.3-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0035.3-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0035.3-2014?

A step-by-step guide to download PDF of GM/T 0035.3-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0035.3-2014".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9