GM/T 0124-2022 PDF EnglishUS$260.00 · In stock · Download in 9 seconds
GM/T 0124-2022: Cryptography test specification for secure separation and information exchange product Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Valid
Similar standardsGM/T 0124-2022: Cryptography test specification for secure separation and information exchange product---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0124-2022 GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.030 CCS L 80 GM/T 0124-2022 Cryptography test specification for secure separation and information exchange product ISSUED ON: NOVEMBER 20, 2022 IMPLEMENTED ON: JUNE 01, 2023 Issued by: State Cryptography Administration Table of ContentsForeword ... 3 1 Scope ... 4 2 Normative references ... 4 3 Terms and definitions ... 4 4 Test contents ... 5 4.1 General ... 5 4.2 Product appearance and structure test ... 6 4.3 Product management function test ... 7 4.4 Product status test ... 7 4.5 Product self-test test ... 8 4.6 Product configuration management test ... 8 4.7 Product cryptographic algorithm correctness and consistency test ... 9 4.8 Product random number quality test ... 10 4.9 Product role identification test ... 11 4.10 Product key management test ... 12 4.11 Product log audit test ... 13 4.12 Product function test ... 13 4.13 Product performance test ... 14 5 Documentation requirements ... 14 5.1 System framework ... 14 5.2 Cryptographic subsystem framework ... 15 5.3 Source code ... 15 5.4 Declaration of the absence of implicit channels ... 15 5.5 Cryptography self-test or self-assessment report ... 15 Cryptography test specification for secure separation and information exchange product1 ScopeThis document specifies the cryptography test contents, test requirements, test methods and documentation requirements for secure separation and information exchange products. This document applies to the test of secure separation and information exchange products, as well as the development of such products.2 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 15843 (all parts) Information technology - Security techniques - Entity authentication GB/T 20279-2015 Information security technology - Security technical requirements of network and terminal separation products GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm GB/T 32907 Information security technology - SM4 block cipher algorithm GB/T 32915 Information security technology - Randomness test methods for binary sequence GB/T 32918 (all parts) Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves GM/T 0062 Random number test requirements for cryptographic modules GM/Z 4001-2013 Cryptology terminology3 Terms and definitionsFor the purpose of this document, the terms and definitions defined in GM/Z 4001 and the following apply. Inspect the appearance, size, internal components and accessories of the product according to the physical parameters of the product. 4.3 Product management function test 4.3.1 Test requirements The product shall use a management interface independent of the working interface for product management. The management interface should support the following main management functions: a) Product installation and initialization, system startup and shutdown, backup and recovery functions; b) Product dual-machine hot standby or load balancing and other availability parameter settings; c) If the product supports remote management, it shall have the ability to close the remote management interface, it shall restrict the addresses that can be remotely managed, and it shall carry out remote management by establishing a secure channel. The cryptographic protocol used in the secure channel shall comply with relevant national cryptographic management regulations; d) Product status query function management, including product configuration algorithm, key management, hardware cryptographic component status, etc.; e) Log management functions, including log recording, log query, log export, etc. 4.3.2 Test method Inspect the management functions supported by the product through the product management interface. 4.4 Product status test 4.4.1 Test requirements The product should have an initial status and a ready status, and can only be converted from the initial status to the ready status. 4.4.2 Test method The test method is as follows. a) After the product is powered on for the first time, it enters the initial status; at this time, the product cannot provide separation services for the two security domains. After the product completes self-test and the administrator configures the network configuration, switching policy, security policy, etc., it enters the ready status. b) After the product completes the initialization configuration, powers on and passes the product self-test, it enters the ready status and provides separation services. 4.5 Product self-test test 4.5.1 Test requirements The test requirements are as follows. a) The product shall support the self-test function, which shall include the cryptographic algorithm correctness, random number quality, authentication data, key and information transmission policy (security attributes) integrity self-test, etc. Among them, the random number quality self-test shall meet the requirements of E products in GM/T 0062. b) The product shall support power-on self-test, periodic self-test and conditional self-test functions. 4.5.2 Test method The test method is as follows. a) After the product is powered on, it automatically performs the power-on self-test. If the self-test is successful, the product automatically enters the ready status; if the self-test fails, the product logs and issues an alarm. b) During operation, the product automatically performs periodic self-tests according to the set cycle. If the self-test fails, the product logs and issues an alarm. c) During operation, the product performs self-tests according to conditions. If the self-test fails, the product logs and issues an alarm. 4.6 Product configuration management test 4.6.1 Test requirements The test requirements are as follows. a) The product shall include but not be limited to management functions such as product permission configuration, network configuration, and access control configuration. b) The permission configuration should: 1) support 2 serial ports (RJ45 or DB9 form) as management control ports; 2) support redundant power supply; 4.7.3 Correctness and consistency of asymmetric cryptographic algorithms 4.7.3.1 Test requirements If the product uses the asymmetric cryptographic algorithm, it shall support the SM2 cryptographic algorithm, and its implementation shall comply with GB/T 32918 (all parts); the product shall be able to use the SM2 algorithm to perform operations such as encryption and decryption, signing/verification of data, and shall be able to support given keys and plaintext (ciphertext) to test the correctness of its operation results. 4.7.3.2 Test method For the encryption and decryption operations that support the SM2 algorithm: a) After the product uses the cryptographic algorithm to encrypt the given key and plaintext, the test platform performs a decryption operation on the ciphertext, and the decryption result is exactly the same as the given plaintext; b) After the product uses the cryptographic algorithm to encrypt the given key and plaintext, it calls the cryptographic algorithm to perform a decryption operation, and the decryption result is exactly the same as the given plaintext. For the signature/verification operation that support the SM2 algorithm: a) After the product uses the given key to call the cryptographic algorithm to sign the message to be signed, the test platform verifies the signature result, and the verification passes; b) After the product uses the given key to call the cryptographic algorithm to sign the message to be signed, it calls the cryptographic algorithm to perform a verification operation, and the verification passes. 4.7.4 Correctness and consistency of hash cryptographic algorithm 4.7.4.1 Test requirements If the product uses the hash cryptographic algorithm, it shall support the SM3 cryptographic algorithm, and its implementation shall comply with GB/T 32905. 4.7.4.2 Test method The product calls the hash algorithm to calculate the hash value for a given message, and the result is exactly the same as the given hash value. 4.8 Product random number quality test 4.8.1 Test requirements The random numbers generated and used by the product shall be provided by the cryptographic module, and the cryptographic module shall be certified by national commercial cryptography certification authority. 4.8.2 Test method Call the product random number generation interface, and collect 1000 128 KB random number files; test the collected random number files, and the test results shall meet the requirements of GB/T 32915. 4.9 Product role identification test 4.9.1 Basic level requirements 4.9.1.1 Test requirements Products with basic security level shall have roles and corresponding identification mechanisms, and different access or operations shall have different permissions. The product shall reject any access or operation that does not have the corresponding permissions to prevent unauthorized malicious personnel from logging in and undermining the security of the product. 4.9.1.2 Test method The test method is as follows: a) Enter the wrong username and random login password through the product management interface, and the login fails; b) Enter the correct username and random login password through the product management interface, and the login fails; c) Enter the correct username and correct login password through the product management interface, and the login is successful. 4.9.2 Enhanced level requirements 4.9.2.1 Test requirements Products with enhanced security level shall use hardware devices such as smart password keys certified by national commercial cryptography certification authority to represent identity, and combine login passwords to implement a multi-factor authentication mechanism, where the password length shall be greater than 6 digits, and the password shall contain at least numbers, uppercase and lowercase letters, and may also contain special characters. The product shall implement an approved authentication mechanism specified in GB/T 15843. 4.9.2.2 Test method f) Key recovery: use the product key management tool to perform the key recovery operation, and successfully restore it to the cryptographic module. g) Key destruction: use the product key management tool to perform the key destruction operation, and successfully destroy the specified key. 4.11 Product log audit test 4.11.1 Test requirements The product shall provide log recording, viewing and export functions, and shall be able to ensure that the log has not been illegally tampered with. 4.11.2 Test method View the log content through the product management interface, which shall include: a) Administrator operation behavior, including operations such as login authentication, configuration management; b) Abnormal events, including records of abnormal events such as self-test failure and authentication failure. The log content should include: a) All attempts to modify security attributes, including the security attribute values before and after the modification; b) The result data of the cryptographic algorithm correctness test, random number quality test, identification data, and key integrity self-test, including self-test items and test results. 4.12 Product function test 4.12.1 General requirements The product shall realize secure data exchange between two security domains, and ensure that the two processing systems inside and outside the secure separation and information exchange product are not connected at the same time. 4.12.2 Basic level requirements 4.12.2.1 Test requirements Products with basic security level shall comply with the provisions of 5.2.2.1.1.1 and 5.2.2.1.1.2 of GB/T 20279-2015. 4.12.2.2 Test method The test method is as follows: a) Simulate the information flow supported by the device, and all information flows between the sender and the receiver of the product shall implement the control strategy specified in 5.2.2.1.1.1 of GB/T 20279-2015; b) Obtain the receiver’s information flow data and verify that the product implements the control functions specified in 5.2.2.1.1.2 of GB/T 20279-2015. 4.12.3 Enhanced level requirements 4.12.3.1 Test requirements Products with enhanced security level shall comply with the provisions of 5.2.2.2.1.1 and 5.2.2.2.1.2 of GB/T 20279-2015. 4.12.3.2 Test method The test method is as follows: a) Simulate the information flow supported by the device, and all information flows between the sender and the receiver of the product shall implement the control strategy specified in 5.2.2.2.1.1 of GB/T 20279-2015; b) Obtain the receiver’s information flow data and verify that the product implements the control function specified in 5.2.2.2.1.2 of GB/T 20279-2015. 4.13 Product performance test The exchange rate and hardware switching time of the product shall comply with the provisions of 5.5 of GB/T 20279-2015.5 Documentation requirements5.1 System framework Developers shall describe the system framework of the product in the form of a structure diagram, including the composition of each subsystem of the secure separation and information exchange product, the functions of each subsystem and the implementation principle of each subsystem, and attach detailed text descriptions. Describe in detail the security mechanism, cryptographic system and key management of secure separation and information exchange products. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GM/T 0124-2022 be delivered?Answer: The full copy PDF of English version of GM/T 0124-2022 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GM/T 0124-2022_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0124-2022_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0124-2022 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GM/T 0124-2022?A step-by-step guide to download PDF of GM/T 0124-2022_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GM/T 0124-2022". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |