HOME   Cart(12)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

GM/T 0006-2023 PDF English

US$380.00 · In stock · Download in 9 seconds
GM/T 0006-2023: Cryptographic application identifier criterion specification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GM/T 0006: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0006-2023English380 Add to Cart 0-9 seconds. Auto-delivery Cryptographic application identifier criterion specification Valid
GM/T 0006-2012English150 Add to Cart 0-9 seconds. Auto-delivery Cryptographic application identifier criterion specification Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0006-2023
      

Similar standards

GM/T 0010   

GM/T 0006-2023: Cryptographic application identifier criterion specification

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0006-2023
GM CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.030 CCS L 80 Replacing GM/T 0006-2012 Cryptographic Application Identifier Criterion Specification Issued on: DECEMBER 4, 2023 Implemented on: JUNE 1, 2024 Issued by. State Cryptography Administration

Table of Contents

Foreword... 3 Introduction... 5 1 Scope... 6 2 Normative References... 6 3 Terms and Definitions... 6 4 Abbreviations... 6 5 Format and Encoding of Identifiers... 7 6 Cryptographic Service Class Identifiers... 8 6.1 Overview... 8 6.2 Algorithm Identifiers... 8 6.3 Data Identifiers... 11 6.4 Protocol Identifiers... 16 7 Security Management Class Identifiers... 17 7.1 Overview... 17 7.2 Role Management Identifiers... 17 7.3 Key Management Identifiers... 18 7.4 System Management Identifiers... 20 7.5 Device Management Identifiers... 20 8 Object Identifiers... 23 Bibliography... 28

Foreword

This document was drafted in accordance with the rules provided in GB/T 1.1-2020 Directives for Standardization - Part 1.Rules for the Structure and Drafting of Standardizing Documents. This document serves as a replacement for GM/T 0006-2012 Cryptographic Application Identifier Criterion Specification. In comparison with GM/T 0006-2012, apart from structural adjustments and editorial modifications, the main technical changes are as follows. a) The SSF33 block cipher algorithm identifier is deleted (see 5.2.1 of Version 2012), and the SHA1 cryptographic hash algorithm identifier is deleted (see 5.2.3 of Version 2012); b) The SM4 and SM7 block cipher algorithm identifiers are added (see 6.2.1), the SM9 IBC asymmetric cryptographic algorithm identifier is added (see 6.2.2), and the SM3_HMAC and SHA256_HMAC cryptographic hash algorithm identifiers are added (see 6.2.3); c) Some certificate parsing item identifiers are added to “Data Identification” (see 6.3.4), and some interface description identifiers are added to “Protocol Identification” (see 6.4.1); d) The relevant OID definitions in the commercial cryptography field are modified (see Chapter 8; Appendix A of Version 2012). Please be noted that certain content of this document may involve patents. The institution issuing this document does not undertake the responsibility of identifying these patents. This document was proposed by and shall be under the jurisdiction of Cryptography Standardization Technical Committee. The drafting organizations of this document. Shandong Dean Information Technology Co., Ltd.; CETC Cyberspace Security Technology Co., Ltd.; Wuxi Jiangnan Information Security Engineering Technology Center; Xingtang Telecommunication Technology Co., Ltd.; KOAL Software Co., Ltd.; Beijing Certificate Authority; WANDA Information Co., Ltd.; Changchun Jiad Zhengyuan Information Technology Co., Ltd.; Beijing Haitai Fangyuan Technology Co., Ltd.; Shanghai Electronic Certificate Authority Center Co., Ltd.; Beijing GoMain Technology Co., Ltd.; China Electric Power Research Institute; Beijing Infosec Technologies Co., Ltd.; Sansec Technology Co., Ltd. The main drafters of this document. Liu Ping, Li Zhihu, Liu Xiaodong, Kong Fanyu, Ma Hongfu, Wang Quanjing, Li Yuanzheng, Xu Qiang, Liu Zengshou, Li Shusheng, Tan Wuzheng, Zheng Qiang, Li Yufeng, Li Weiping, Cui Jiuqiang, Zhou Dong, Yuan Feng, Wang Zongbin, Gao Zhiquan. The issuing of the previous versions. Cryptographic Application Identifier Criterion Specification

1 Scope

This document describes the cryptographic service class identifiers and security management class identifiers used in cryptographic applications, and various object identifiers in the field of commercial cryptography. This document is applicable to the standardized use of identifiers in the development and use of cryptographic devices and cryptographic systems, and it is also applicable to the use of identifiers in the preparation of other relevant standards and protocols.

2 Normative References

The contents of the following documents constitute indispensable clauses of this document through the normative references in the text. In terms of references with a specified date, only versions with a specified date are applicable to this document. In terms of references without a specified date, the latest version (including all the modifications) is applicable to this document. GM/Z 4001 Cryptology Terminology

3 Terms and Definitions

The terms and definitions defined in GM/Z 4001 and the following are applicable to this document. 3.1 identifier An integer used to identify cryptographic algorithms, operational data, cryptographic protocols, role management, key management, system management, and device management involved in cryptographic applications. 3.2 network byte order A data representation format specified by the Big-endian sorting mode. NOTE. the network byte order is independent of the specific CPU type and operating system, so that it can be ensured that data can be correctly interpreted when transmitted among different hosts.

4 Abbreviations

The following abbreviations apply to this document. BC. Block Chaining CBC. Cipher Block Chaining CCM. Counter with CBC-MAC CFB. Ciphertext Feedback CRL. Certificate Revocation List CTR. Counter DER. Distinguished Encoding Rules ECB. Electronic Code Book GCM. Galois Counter Mode HCTR. universal Hash function based CTR HMAC. keyed-Hash Message Authentication Code IBC. Identity-Based Cryptography MAC. Message Authentication Code OCSP. Online Certificate Status Protocol OFB. Output Feedback OFBNLF. Output Feedback with a Nonlinear Function OID. Object Identifier PEM. Privacy-Enhanced Mail PKI. Public Key Infrastructure XEX. Xor-Encryption-Xor XTS. XEX Tweakable Block Cipher with Ciphertext Stealing

5 Format and Encoding of Identifiers

The identifier is a 32-bit unsigned integer type and shall be defined or processed directly as an integer type during the specific implementation or calling of cryptographic applications. When transmitting across platforms, in order to avoid the impact or errors caused by the differences in byte order among different platforms, the identifier shall be processed in the network byte order of storing high-order bytes at low addresses.

6 Cryptographic Service Class Identifiers

6.1 Overview The cryptographic service class identifiers define the phrases and data representing the cryptographic algorithms, operational data and cryptographic protocols involved in the cryptographic service devices or cryptographic service interfaces. This type of data identifier is used in the calling process of cryptographic service devices or cryptographic service interfaces, such as data encryption, digital signature and identity authentication application scenarios. 6.2 Algorithm Identifiers 6.2.1 Block cipher algorithm identifiers The block cipher algorithm identifiers contain the type of cryptographic algorithm, key length and encryption mode of the block algorithm. They are used when calling the cryptographic service object for cryptographic operations or obtaining the cryptographic operational capabilities of the cryptographic service object. The encoding rule of the block cipher algorithm identifiers is as follows. from low to high, bits 0 ~ 7 and bits 24 ~ 31 represent the block cipher algorithm working mode bit by bit, and bits 8 ~ 15 represent the type of block cipher algorithm bit by bit. For example. When multiple block cipher algorithms exist at the same time, they can be represented in the form of “OR”. The identifiers of block cipher algorithms are shown in Table 1. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0006-2023 be delivered?

Answer: The full copy PDF of English version of GM/T 0006-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0006-2023_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0006-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0006-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

Question 5: Should I purchase the latest version GM/T 0006-2023?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0006-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

How to buy and download a true PDF of English version of GM/T 0006-2023?

A step-by-step guide to download PDF of GM/T 0006-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0006-2023".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9   

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information