HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0046-2024 English PDF

US$379.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GM/T 0046-2024: (Financial data encryption machine testing specifications)
Status: Valid

GM/T 0046: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GM/T 0046-2024English379 Add to Cart 4 days [Need to translate] (Financial data encryption machine testing specifications) Valid GM/T 0046-2024
GM/T 0046-2016English150 Add to Cart 0--9 seconds. Auto-delivery Test specification for financial cryptographic server Valid GM/T 0046-2016

Basic data

Standard ID GM/T 0046-2024 (GM/T0046-2024)
Description (Translated English) (Financial data encryption machine testing specifications)
Sector / Industry Chinese Industry Standard (Recommended)
Word Count Estimation 17,136
Date of Issue 2024-12-27
Date of Implementation 2025-07-01
Issuing agency(ies) State Administration of Cryptography

GM/T 0046-2016: Test specification for financial cryptographic server

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Financial data cipher machine test specification ICS 35.040 L80 Record number. 58551-2017 People's Republic of China Password Industry Standard Financial data encryption machine testing specifications Released on.2016-12-23 2016-12-23 implementation Issued by the National Cryptography Administration

Table of contents

Preface Ⅲ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 3 5 Testing environment requirements 4 6 Test content and test method 4 6.1 Test item 4 6.2 Inspection of appearance and structure 5 6.3 Function test 5 6.3.1 Initial detection 5 6.3.2 Cryptographic operation detection 5 6.3.3 Key management detection 6 6.3.4 Random number detection 7 6.3.5 Access control detection 7 6.3.6 Equipment management testing 7 6.3.7 Log audit detection 7 6.3.8 Equipment self-inspection test 8 6.3.9 Data message interface detection 8 6.4 Performance testing 8 6.4.1 Performance index calculation method 8 6.4.2 PIN encryption performance test 9 6.4.3 PIN to encryption performance test 9 6.4.4 MAC calculation performance test 9 6.4.5 ARQC verification performance test 9 6.4.6 Encryption and decryption performance test of symmetric cryptographic algorithm 9 6.4.7 Encryption and decryption performance test of asymmetric cryptographic algorithm 9 6.4.8 Performance test of data hash algorithm 10 6.4.9 Random number generator performance test 10 6.4.10 Asymmetric key generation performance test 10 6.4.11 Asymmetric algorithm signature and signature verification performance test 10 6.5 Other tests 10 6.5.1 Equipment safety test 10 6.5.2 Environmental adaptability test 10 6.5.3 Reliability testing 10 7 Technical document requirements for inspection 10 8 Eligibility criteria 11 Appendix A (Normative Appendix) Test Item List 12 Reference 18

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that certain contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents. This standard was proposed and managed by the Cryptographic Industry Standardization Technical Committee. Drafting organizations of this standard. Wuxi Jiangnan Information Security Engineering Technology Center, Commercial Cryptographic Testing Center of National Cryptography Administration, Guardian Communication Information Industry Co., Ltd., Xingtang Communication Technology Co., Ltd., Shandong Dean Information Technology Co., Ltd. The main drafters of this standard. Zhang Suocheng, Qi Chuanbing, Li Dawei, Deng Kaiyong, Luo Peng, Li Guoyou, Liu Chang, Xiao Qiulin, Ding Yuquan, Liu Xianxiang, Li Yuanzheng, Wang Nina, Kong Fanyu. Financial data encryption machine testing specifications

1 Scope

This standard specifies the testing requirements and testing methods for financial data cryptographic machines. This standard applies to the detection of financial data cryptographic machines and the development of such cryptographic equipment.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article Pieces. For undated references, the latest version (including all amendments) applies to this document. GB/T 32915 Information Security Technology Binary Sequence Randomness Detection Method GM/T 0028 security requirements for cryptographic modules GM/T 0039 password module security testing requirements GM/T 0045-2016 Financial Data Cryptographic Machine Technical Specification GM/T 0050 Password Device Management Device Management Technical Specification

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Financial data cryptographic machine financialcryptographicserver Used in the financial field to protect the security of financial data, mainly to realize PIN encryption, PIN transfer encryption, MAC generation and verification, and data decryption A cryptographic device with cryptographic services such as encryption, signature verification, and key management. 3.2 Symmetric cryptographic algorithm symmetriccryptographicalgorithm Encryption and decryption use the same key cryptographic algorithm. 3.3 Asymmetric cryptographic algorithm/public key cryptographic algorithm asymmetriccryptographicalgorithm/publickeycryptographical- gorithm Encryption and decryption use different key cryptographic algorithms. One of the keys (public key) can be made public, and the other key (private key) must be kept It is computationally infeasible to solve the private key from the public key. 3.4 Password hash algorithm HASH algorithm Also known as hash algorithm, password hash algorithm or hash algorithm. The algorithm maps an arbitrarily long bit string to a fixed length ratio Special string, and meet the following three characteristics. a) It is computationally difficult to find an input that can be mapped to the output for a given output; b) It is computationally difficult to find another input that can be mapped to the same output for a given input; c) It is computationally difficult to find that different inputs map to the same output.