Path:
Home >
GB/T >
Page207 > GB/T 40653-2021
Price & Delivery
US$1159.00 · In stock · Download in 9 secondsGB/T 40653-2021: Information security technology - Technical requirements for security processor
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 40653-2021 | English | 1159 |
Add to Cart
|
7 days [Need to translate]
|
Information security technology - Technical requirements for security processor
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 40653-2021 (GB/T40653-2021) |
| Description (Translated English) | Information security technology - Technical requirements for security processor |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Word Count Estimation | 58,545 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 40653-2021: Information security technology - Technical requirements for security processor
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Technical requirements for security processor
ICS 35.030
CCSL80
National Standards of People's Republic of China
Information Security Technology
Security processor technical requirements
Released on 2021-10-11
2022-05-01 implementation
State Administration of Market Supervision and Administration
Issued by the National Standardization Management Committee
Table of contents
Foreword Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 Security processor general structure 2
6 Security purpose 4
7 Safety function requirements 7
8 Security requirements 20
Appendix A (informative) Life cycle stage and working status description 37
Appendix B (Informative) Definition of Assets and Security Issues 45
Appendix C (normative) Component dependencies 51
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents.
This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
Drafting organizations of this document. Beijing Duosi Science and Technology Industrial Park Co., Ltd., China Information Security Evaluation Center, State Cryptography Administration
Password Testing Center, North China Electric Power University, the Third Research Institute of the Ministry of Public Security, Wangshen Information Technology (Beijing) Co., Ltd., China Electronic Information
Industrial Development Research Institute, Hangzhou Hualan Microelectronics Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Chinese People's Liberation Army
Strategically support the Army Information Engineering University, Zhuhai Fudan Innovation Research Institute, Beijing Duosi Security Chip Technology Co., Ltd.
The main drafters of this document. Liu Dali, Li Dawei, Luo Peng, Zhang Chongbin, Wangzhoufu, Gao Jinping, Shi Hongsong, Yang Yongsheng, Cao Chunchun, Xia Hong,
Wang Chuang, Wei Anlei, Yang Yuanyuan, Liu Huipeng, Li Hongyang, Wei Xiaowei, Wang Hui, Song Ke, Wang Junyu, Gao Yanfang, Zhou Bin.
Information Security Technology
Security processor technical requirements
1 Scope
This document specifies the safety function requirements and safety assurance requirements of the safety processor.
This document applies to the design, production and application of safety processors.
2 Normative references
The contents of the following documents constitute indispensable clauses in this document through normative references in the text. Among them, dated quotations
Only the version corresponding to the date is applicable to this document. For undated reference documents, the latest version (including all amendments) is applicable to
This document.
GB/T 18336 (all parts) Information Technology Security Technology Information Technology Security Evaluation Criteria
GB/T 25069 Information Security Technical Terms
GB/T 32915-2016 Information security technology binary sequence randomness detection method
3 Terms and definitions
The following terms and definitions defined in GB/T 25069 apply to this document.
3.1
Securityprocessor
Composed of firmware and hardware entities, it has physical protection, logical protection, and application protection capabilities, and can achieve a certain security strength and safety, etc.
Level of processor.
Note. The security processor implementation technology includes cryptographic technology, physical protection technology, data encoding technology, reconfigurable logic technology, etc.
3.2
Physical protection
Adopt the design of attack protection, attack detection methods, use detection and processing functions to monitor the working environment of the processor, and support abnormalities
Behavior response audit processing, security capabilities to prevent physical threats.
Note. Attack protection includes security protection design of masks, packaging, physical interfaces, etc.; attack detection includes optical, electromagnetic, logical open circuit, short circuit, bypass detection, etc.; engineering
The operating environment includes temperature, frequency, voltage testing, etc.; response audit processing includes measures such as notification, marking, response processing, and audit processing.
3.3
Application protection
Link physical protection functions, with the ability to protect programs and data, run state detection and monitoring capabilities, resource scheduling and configuration control
The ability to control security, secure communication, and support abnormal behavior response audit processing, and prevent application threats.
Note. Protection capabilities include the use of homomorphic computing, cryptographic technology applications to program and data processing capabilities, resource scheduling and configuration control including secure storage and control
Measures such as management and security configuration, and secure communication includes measures such as encrypted transmission, the use of trusted root transmission, and identity authentication.
3.4
Logic protection
According to the security functions of physical protection and application protection, adjust the security policy through resource configuration, operation configuration, and running state control.
To make the logical structure and control have stronger security strength and flexibility against unknown attacks, and the security ability to prevent logical threats.
3.5
Runningstate
Safety processor operating status.
...