GM/T 0035.1-2014 PDF EnglishUS$150.00 · In stock · Download in 9 seconds
GM/T 0035.1-2014: Specifications of Cryptographic Application for RFID Systems - Part 1: Cryptographic Protection Framework and Security Levels Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Valid
Similar standardsGM/T 0035.1-2014: Specifications of Cryptographic Application for RFID Systems - Part 1: Cryptographic Protection Framework and Security Levels---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0035.1-2014 GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Record No.. 44636-2014 Specifications of Cryptographic Application for RFID Systems – Part 1. Cryptographic Protection Framework and Security Levels Issued on: FEBRUARY 13, 2014 Implemented on: FEBRUARY 13, 2014 Issued by. State Cryptography Administration Table of ContentsForeword ... 3 1 Scope .. 4 2 Normative References ... 4 3 Terms and Definitions ... 4 4 Symbols and Abbreviation .. 9 5 Security of RFID system .. 9 5.1 Cryptographic protection framework of RFID system .. 9 5.2 Cryptographic application technology standard framework of RFID system ... 10 5.3 Cryptographic protection framework and security levels .. 11 5.4 RFID tag security .. 11 5.5 Reader security ... 11 5.6 Communication security between RFID tag and reader .. 12 5.7 Key management ... 12 6 Security Level Classification and Technical Requirements of RFID System ... 12 6.1 Level classification .. 12 6.2 All-level cryptographic security technology requirements ... 13 7 Distribution of Cryptographic Algorithm ... 16 Appendix A (Informative) Cryptographic Security Solution for RFID Tag Anti- Counterfeiting Application ... 17 A.1 Solution summary .. 17 A.2 Cryptographic security technology and its realization of RFID tag chip ... 19 A.3 Cryptographic security technology and security realization of RFID tag reader ... 21 A.4 Communication security technology between RFID tag and reader ... 24 A.5 Cryptographic algorithm and key management... 26ForewordGM/T 0035 Specifications of Cryptographic Application for RFID Systems can be divided into 5 parts. --- Part 1. Cryptographic Protection Framework and Security Levels; --- Part 2. Specification of Cryptographic Application for RFID tag chip; --- Part 3. Specification of Cryptographic Application for RFID Reader; --- Part 4. Specification of Cryptographic Application for Communication; --- Part 5. Specification for Key Management. This Part belongs to Part 1 of GM/T 0035. This Part shall be drafted as per the rules of GB/T 1.1-2009. This Part was proposed and under the jurisdiction of Cryptographic Industry Standardization Technical Committee. Drafting organizations of this Part. Shanghai HSIC Application System Co., Ltd., Fudan University, Shanghai Huahong Integrated Circuit Co., Ltd., Beijing Zhongdian Huada Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Xingtang Communication Technology Co., Ltd., Beijing Tongfang Micro-Electronics Co., Ltd., Aisino Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd. Chief drafting staffs of this Part. Gu Zhen, Dong Haoran, Wang Junyu, Xie Wenlu, Wang Yunsong, Liang Shaofeng, Yu Jun, Wu Xingjun, Wang Junfeng, Zhou Jiansuo, Xu Shumin, Chen Yue, Liu Xun, and Wang Huibo. Specifications of Cryptographic Application for RFID Systems – Part 1. Cryptographic Protection Framework and Security Levels1 ScopeThis Part of GM/T 0035 specifies the cryptographic protection framework and security levels of RFID system; and the correlation with GM/T 0035.2-2014, GM/T 0035.3-2014, GM/T 0035.4-2014, GM/T 0035.5-2014. Appendix A gives an example of cryptographic security scheme for RFID system. This Part is applicable to the design, implementation and application for cryptographic security of RFID system.2 Normative ReferencesThe following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this document. GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems – Part 2. Specification of Cryptographic Application for RFID Tag Chip GM/T 0035.3-2014 Specification of Cryptographic Application for RFID Systems – Part 3. Specification of Cryptographic Application for RFID Reader GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems - Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems - Part 5. Specification for Key Management3 Terms and DefinitionsThe following terms and definitions are applicable to this document. 3.11 Confidentiality The nature ensuring that the information is not exposed to the unauthorized individuals, processes and other entities. 3.12 Encipherment/Encryption The process of generating ciphertext through cryptographic transmission of the data. 3.13 Authentication Confirm the authenticity of an entity’s claimed identity or information. 3.14 Decipherment/Decryption The inverse process corresponding to the encryption process. 3.15 Non-repudiation Also known as undeniable; the mechanism proves that an operation or event has occurred and can’t deny. 3.16 Object Information carrier. 3.17 Cryptographic module Relatively independent software, hardware, firmware or their combination that perform cryptographic calculation function. 3.18 Cryptographic algorithm Describe the calculation rules during the cryptographic processing procedure. 3.19 Cryptography protocol Two or more participants use the cryptographic algorithm, in accordance with the agreed rules, to take a series of steps to achieve a particular purpose. 3.20 Cryptographic hash function [Translator note. hash function has additional 2 nick-names in Chinese] mapping an arbitrarily long bit string to a function of fixed-length bit string; and satisfy the following characteristics. a) It is computationally difficult to find out an input that can be mapped to the output for a given output; 5.6 Communication security between RFID tag and reader The communication security elements between RFID tag and reader include confidentiality of transmission information, integrity of transmission information, ID authentication. Thereof, ID authentication includes unique identifier authentication, challenge response authentication from RFID tag to the reader, challenge response authentication from reader to RFID tag, two-way challenge response authentication between RFID tag and reader. The relevant technical requirements shall refer to GM/T 0035.4-2014. 5.7 Key management It specifies the RFID tag, reader and their communication related key management requirements when RFID system adopts cryptographic mechanism. The relevant technical requirements shall refer to GM/T 0035.5-2014. 6 Security Level Classification and Technical Requirements of RFID System 6.1 Level classification It can be divided into four levels according to different RFID system of cryptographic security technical requirements; each level specifies the minimum security precautions that shall be supported by the RFID system; its security strength is gradually increased. The uses can choose the levels according to different security requirements. Level-1 is applicable to some applications with lower security requirements; it shall take the security mechanism of ID authentication. Level-2 is applicable to some applications with certain security requirements; it shall take the security mechanism of ID authentication and access control; Level-3 is applicable to some applications with higher security requirements; it shall take the security mechanism of confidentiality, integrity, non-repudiation, ID authentication, and access control; Level-4 is applicable to some applications with highest security requirements; it shall take the security mechanism of confidentiality, integrity, non-repudiation, ID authentication, access control and audit, etc. The following contents shall not be considered when classifying the cryptographic security levels. The same as 6.2.1.2.1. 6.2.2.3.2 Key management The same as 6.2.1.2.2. 6.2.3 Level-3 6.2.3.1 Confidentiality It shall support the confidentiality protection function of storage information; so that it can take encryption protection against the sensitive information stored in the RFID tag; ensure that the unauthorized reader can’t obtain or modify such information. It shall support the confidentiality protection function of transmission information between the reader and RFID tag; so that it can take encryption protection against the communication information between reader and RFID tag; ensure that the information shall not be leaked or stolen. 6.2.3.2 Integrity It shall support the integrity protection of the storage information; so that it can use cryptographic technology to verify the sensitive information stored in the RFID system; finally find out whether the i... ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GM/T 0035.1-2014 be delivered?Answer: The full copy PDF of English version of GM/T 0035.1-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GM/T 0035.1-2014_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0035.1-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0035.1-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GM/T 0035.1-2014?A step-by-step guide to download PDF of GM/T 0035.1-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GM/T 0035.1-2014". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |