GM/T 0042-2015 PDF English
US$560.00 · In stock · Download in 9 secondsGM/T 0042-2015: Test specification for cryptography and security protocol in tri-element peer architecture Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0042-2015 | English | 560 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Test specification for cryptography and security protocol in tri-element peer architecture
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0042-2015
GM/T 0042-2015: Test specification for cryptography and security protocol in tri-element peer architecture ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0042-2015
GM
CRYPTOGRAPHY INDUSTRY STANDARD
ICS 35.040
L 80
File No.. 49741-2015
Test specification for cryptography and security
protocol in tri-element peer architecture
Issued on. APRIL 01, 2015
Implemented on. APRIL 01, 2015
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms and definitions... 7
4 Symbols and abbreviations... 8
5 Basic technical requirements... 9
5.1 Correctness and consistency requirements of cryptographic algorithm
implementation... 9
5.2 Conformity and interoperability requirements for protocol implementation... 10
5.3 Other requirements... 11
6 Test environment requirements... 11
6.1 Test equipment... 11
6.2 Test topology... 12
7 Unified sealing of cryptography and security protocol test in tri-element peer
architecture... 14
7.1 Definition of unified sealing data structure... 14
7.2 Definitions of unified sealing data element... 16
8 Test method of cryptographic algorithm implementation correctness and
consistency... 17
8.1 Test method of symmetric cryptographic algorithm implementation
correctness and consistency... 17
8.2 Test methods of digital signature algorithm implementation correctness and
consistency... 17
8.3 Test methods of key exchange protocol implementation correctness and
consistency... 18
8.4 Test methods of public key encryption algorithm implementation correctness
and consistency... 18
8.5 Test methods of digital certificate format... 19
8.6 Test methods of cryptographic hash algorithm... 19
8.7 Test methods of random number... 20
9 Test methods for protocol implementation consistency and interoperability
... 20
9.1 Port control test method... 20
9.2 TAEP protocol sealing test method... 21
9.3 TAEPoL protocol sealing test method... 22
9.4 TCP/UDP port test method... 22
Appendix A (Informative) TAEP protocol sealing Request and Response group
Type definition... 23
Appendix B (Normative) Unified sealing data element of cryptography and
security protocol test in tri-element peer architecture... 25
Appendix C (Normative) Equipment naming... 36
Appendix D (Informative) Test vector... 38
1 Scope
This standard specifies the basic technical requirements of the tri-element peer
architecture cryptography security protocol for the relevant cryptography
algorithm and security protocol as well as the corresponding test methods, it is
applicable to the detection of tri-element peer cryptography security protocol-
related products. It mainly includes the following contents.
a) Technical requirements and test methods for the correctness and
consistency of cryptography algorithm implementation;
b) Basic technical requirements and test methods for compliance and
interoperability of the protocol implementation.
This standard applies to the equipment complying with ISO/IEC 9798-
3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect
whether its cryptography algorithm and protocol implementation comply with
the requirements of the above standards.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GB/T 15843.3 Information technology - Security techniques - Entity
authentication - Part 3.Mechanisms using digital signature techniques
GB/T 28455-2012 Information security technology - Entity authentication
involving a trusted third party and access architecture specification
GM/T 0002 SM4 block cipher algorithm
GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves
GM/T 0004 SM3 password hashing algorithm
GM/T 0005 Randomness test specification
3 Terms and definitions
The terms and definitions as defined in GM/Z 4001 and GB/T 28455-2012 as
well as the following terms and definitions apply to this document.
3.1
Tested equipment
An equipment that implements a tri-element peer cryptography security
protocol.
3.2
Test platform
A platform for the tri-element peer cryptography security protocol test, it is
used to collect and analyze the test data, judge the test data in accordance
with the requirements of the test specifications, and present and record the
judgement results.
3.3
Access control
A mechanism that allows or denies user access to resources in accordance
with specific policies.
3.4
Support equipment
A special standard equipment which, in addition to interacting with
cryptography and security protocol in tri-element peer architectures, also
requires proactive provision of data for assistance test to the test platform.
3.5
Standard equipment
The equipment which needs to be used synchronously when testing the
tested equipment AND works together with the tested equipment to
implement the cryptography and security protocol in tri-element peer
architecture interacting process. The standard equipment is an equipment
complying with the cryptography and security protocol in tri-element peer
architecture.
4 Symbols and abbreviations
The abbreviations as defined in GM/Z 4001 and GB/T 28455-2012 and the
following abbreviations apply to this document.
AAC. Authentication Access Controller
5 Basic technical requirements
5.1 Correctness and consistency requirements of
cryptographic algorithm implementation
The cryptography and security protocol test in tri-element peer architecture
shall provide input and output for cryptographic algorithm testing in accordance
with the requirements of the national cryptographic industry standard.
5.2 Conformity and interoperability requirements for protocol
implementation
5.2.1 Port control requirements
The port access control mechanism in the tri-element peer cryptographic
security protocol product shall comply with the provisions of GB/T 28455-2012.
In GB/T 28455-2012, it requires the port access entity (PAE) to make operation
for the authentication access control protocol. For the system that supports the
port access control functions, each port has a PAE, regardless of whether the
system plays the role of a requestor or authentication access controller role. In
the authentication interaction, the requester PAE and the authentication access
controller PAE control the authorized/unauthorized status of the controlled port
in accordance with the result of the authentication process.
5.2.4 Underlay and transport layer protocol sealing requirements
The TAEP message is transmitted between the authentication access controller
and the authentication server using the TAEP-AS-SVC service protocol
specified in GB/T 28455-2012.The authentication server receives the TAEP
message on the UDP/TCP port 5111 as the server end and authentication
access controller sends the TAEP message as a client.
5.3 Other requirements
Products need to consider self-test, and the product reliability and stability shall
meet the specific scenario requirements of the product application.
6 Test environment requirements
6.1 Test equipment
The test equipment shall be subject to metrological verification, and within the
period of validity of the verification, the accuracy of the test equipment shall
meet the measurement requirements.
6.2 Test topology
6.2.1 Overview
The protocol entity involved in the cryptography and security protocol in tri-
element peer architecture includes the requester REQ, the authentication
access controller AAC, and the authentication server AS.
6.2.2 REQ test topology
In the test topology for REQ, the tested equipment is REQ, the standard
equipment is AAC, and the support equipment is AS.
6.2.3 AAC test topology
For the AAC test topology, the tested equipment is AAC, the standard
equipment is REQ, the support equipment is AS.
7 Unified sealing of cryptography and security
protocol test in tri-element peer architecture
7.1 Definition of unified sealing data structure
Support equipment and tested equipment shall, in accordance with the unified
sealing structure of the cryptography and security protocol test in tri-element
peer architecture, seal the original message and provide it to the test platform.
7.2 Definitions of unified sealing data element
The data elements in the data fields in the unified data sealing are sealed in
TLV format, as shown in Figure 5.
8 Test method of cryptographic algorithm implementation correctness and consistency
8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency
The test method is as follows.
a) Set up a test network to perform the interactions of cryptography and
8.2 Test methods of digital signature algorithm
implementation correctness and consistency The test method is as follows.
8.3 Test methods of key exchange protocol implementation
correctness and consistency
The test method is as follows.
8.5 Test methods of digital certificate format
The test method is as follows.
8.6 Test methods of cryptographic hash algorithm
The test method is as follows.
8.7 Test methods of random number
The test method is as follows.
9 Test methods for protocol implementation consistency and interoperability
9.1 Port control test method
This test is for REQ and AAC.
When the tested equipment is a REQ, the test topology is as shown in 6.2.2.
The standard equipment AAC and the support equipment AS are required to
perform the test.
9.3 TAEPoL protocol sealing test method
This test is for REQ and AAC.
9.4 TCP/UDP port test method
This test is for AAC and AS.
When the tested equipment is AAC, the standard equipment REQ and the
support equipment AS are required to perform test.
GM/T 0042-2015
GM
CRYPTOGRAPHY INDUSTRY STANDARD
ICS 35.040
L 80
File No.. 49741-2015
Test specification for cryptography and security
protocol in tri-element peer architecture
Issued on. APRIL 01, 2015
Implemented on. APRIL 01, 2015
Issued by. State Cryptography Administration
Table of Contents
Foreword... 4
Introduction... 5
1 Scope... 6
2 Normative references... 6
3 Terms and definitions... 7
4 Symbols and abbreviations... 8
5 Basic technical requirements... 9
5.1 Correctness and consistency requirements of cryptographic algorithm
implementation... 9
5.2 Conformity and interoperability requirements for protocol implementation... 10
5.3 Other requirements... 11
6 Test environment requirements... 11
6.1 Test equipment... 11
6.2 Test topology... 12
7 Unified sealing of cryptography and security protocol test in tri-element peer
architecture... 14
7.1 Definition of unified sealing data structure... 14
7.2 Definitions of unified sealing data element... 16
8 Test method of cryptographic algorithm implementation correctness and
consistency... 17
8.1 Test method of symmetric cryptographic algorithm implementation
correctness and consistency... 17
8.2 Test methods of digital signature algorithm implementation correctness and
consistency... 17
8.3 Test methods of key exchange protocol implementation correctness and
consistency... 18
8.4 Test methods of public key encryption algorithm implementation correctness
and consistency... 18
8.5 Test methods of digital certificate format... 19
8.6 Test methods of cryptographic hash algorithm... 19
8.7 Test methods of random number... 20
9 Test methods for protocol implementation consistency and interoperability
... 20
9.1 Port control test method... 20
9.2 TAEP protocol sealing test method... 21
9.3 TAEPoL protocol sealing test method... 22
9.4 TCP/UDP port test method... 22
Appendix A (Informative) TAEP protocol sealing Request and Response group
Type definition... 23
Appendix B (Normative) Unified sealing data element of cryptography and
security protocol test in tri-element peer architecture... 25
Appendix C (Normative) Equipment naming... 36
Appendix D (Informative) Test vector... 38
1 Scope
This standard specifies the basic technical requirements of the tri-element peer
architecture cryptography security protocol for the relevant cryptography
algorithm and security protocol as well as the corresponding test methods, it is
applicable to the detection of tri-element peer cryptography security protocol-
related products. It mainly includes the following contents.
a) Technical requirements and test methods for the correctness and
consistency of cryptography algorithm implementation;
b) Basic technical requirements and test methods for compliance and
interoperability of the protocol implementation.
This standard applies to the equipment complying with ISO/IEC 9798-
3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect
whether its cryptography algorithm and protocol implementation comply with
the requirements of the above standards.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GB/T 15843.3 Information technology - Security techniques - Entity
authentication - Part 3.Mechanisms using digital signature techniques
GB/T 28455-2012 Information security technology - Entity authentication
involving a trusted third party and access architecture specification
GM/T 0002 SM4 block cipher algorithm
GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves
GM/T 0004 SM3 password hashing algorithm
GM/T 0005 Randomness test specification
3 Terms and definitions
The terms and definitions as defined in GM/Z 4001 and GB/T 28455-2012 as
well as the following terms and definitions apply to this document.
3.1
Tested equipment
An equipment that implements a tri-element peer cryptography security
protocol.
3.2
Test platform
A platform for the tri-element peer cryptography security protocol test, it is
used to collect and analyze the test data, judge the test data in accordance
with the requirements of the test specifications, and present and record the
judgement results.
3.3
Access control
A mechanism that allows or denies user access to resources in accordance
with specific policies.
3.4
Support equipment
A special standard equipment which, in addition to interacting with
cryptography and security protocol in tri-element peer architectures, also
requires proactive provision of data for assistance test to the test platform.
3.5
Standard equipment
The equipment which needs to be used synchronously when testing the
tested equipment AND works together with the tested equipment to
implement the cryptography and security protocol in tri-element peer
architecture interacting process. The standard equipment is an equipment
complying with the cryptography and security protocol in tri-element peer
architecture.
4 Symbols and abbreviations
The abbreviations as defined in GM/Z 4001 and GB/T 28455-2012 and the
following abbreviations apply to this document.
AAC. Authentication Access Controller
5 Basic technical requirements
5.1 Correctness and consistency requirements of
cryptographic algorithm implementation
The cryptography and security protocol test in tri-element peer architecture
shall provide input and output for cryptographic algorithm testing in accordance
with the requirements of the national cryptographic industry standard.
5.2 Conformity and interoperability requirements for protocol
implementation
5.2.1 Port control requirements
The port access control mechanism in the tri-element peer cryptographic
security protocol product shall comply with the provisions of GB/T 28455-2012.
In GB/T 28455-2012, it requires the port access entity (PAE) to make operation
for the authentication access control protocol. For the system that supports the
port access control functions, each port has a PAE, regardless of whether the
system plays the role of a requestor or authentication access controller role. In
the authentication interaction, the requester PAE and the authentication access
controller PAE control the authorized/unauthorized status of the controlled port
in accordance with the result of the authentication process.
5.2.4 Underlay and transport layer protocol sealing requirements
The TAEP message is transmitted between the authentication access controller
and the authentication server using the TAEP-AS-SVC service protocol
specified in GB/T 28455-2012.The authentication server receives the TAEP
message on the UDP/TCP port 5111 as the server end and authentication
access controller sends the TAEP message as a client.
5.3 Other requirements
Products need to consider self-test, and the product reliability and stability shall
meet the specific scenario requirements of the product application.
6 Test environment requirements
6.1 Test equipment
The test equipment shall be subject to metrological verification, and within the
period of validity of the verification, the accuracy of the test equipment shall
meet the measurement requirements.
6.2 Test topology
6.2.1 Overview
The protocol entity involved in the cryptography and security protocol in tri-
element peer architecture includes the requester REQ, the authentication
access controller AAC, and the authentication server AS.
6.2.2 REQ test topology
In the test topology for REQ, the tested equipment is REQ, the standard
equipment is AAC, and the support equipment is AS.
6.2.3 AAC test topology
For the AAC test topology, the tested equipment is AAC, the standard
equipment is REQ, the support equipment is AS.
7 Unified sealing of cryptography and security
protocol test in tri-element peer architecture
7.1 Definition of unified sealing data structure
Support equipment and tested equipment shall, in accordance with the unified
sealing structure of the cryptography and security protocol test in tri-element
peer architecture, seal the original message and provide it to the test platform.
7.2 Definitions of unified sealing data element
The data elements in the data fields in the unified data sealing are sealed in
TLV format, as shown in Figure 5.
8 Test method of cryptographic algorithm implementation correctness and consistency
8.1 Test method of symmetric cryptographic algorithm implementation correctness and consistency
The test method is as follows.
a) Set up a test network to perform the interactions of cryptography and
8.2 Test methods of digital signature algorithm
implementation correctness and consistency The test method is as follows.
8.3 Test methods of key exchange protocol implementation
correctness and consistency
The test method is as follows.
8.5 Test methods of digital certificate format
The test method is as follows.
8.6 Test methods of cryptographic hash algorithm
The test method is as follows.
8.7 Test methods of random number
The test method is as follows.
9 Test methods for protocol implementation consistency and interoperability
9.1 Port control test method
This test is for REQ and AAC.
When the tested equipment is a REQ, the test topology is as shown in 6.2.2.
The standard equipment AAC and the support equipment AS are required to
perform the test.
9.3 TAEPoL protocol sealing test method
This test is for REQ and AAC.
9.4 TCP/UDP port test method
This test is for AAC and AS.
When the tested equipment is AAC, the standard equipment REQ and the
support equipment AS are required to perform test.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0042-2015 be delivered?Answer: The full copy PDF of English version of GM/T 0042-2015 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0042-2015_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0042-2015_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0042-2015 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0042-2015?A step-by-step guide to download PDF of GM/T 0042-2015_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0042-2015". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|