Skip to product information
1 of 12

www.ChineseStandard.us -- Field Test Asia Pte. Ltd.

GM/T 0028-2014 English PDF (GM/T0028-2014)

GM/T 0028-2014 English PDF (GM/T0028-2014)

Regular price $365.00
Regular price Sale price $365.00
Sale Sold out
Shipping calculated at checkout.

GM/T 0028-2014: Security requirements for cryptographic modules

Delivery: 9 seconds. Download (and Email) true-PDF + Invoice.
Get Quotation: Click GM/T 0028-2014 (Self-service in 1-minute)
Newer / historical versions: GM/T 0028-2014

Preview True-PDF


Scope

This Standard, for the cryptographic modules which are used to protect the
security system of sensitive information in computer and telecommunications
systems, specifies security requirements. The Standard defines 4 security
levels for cryptographic modules, to meet the security requirements of different
degrees of sensitive information and many application fields. For the 11 security
domains of cryptographic modules, this Standard gives the corresponding
requirements of the four security levels. The high security level, on the basis of
the low security level, further improves security.

Basic Data

Standard ID GM/T 0028-2014 (GM/T0028-2014)
Description (Translated English) Security requirements for cryptographic modules
Sector / Industry Chinese Industry Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 61,661
Date of Issue 2/13/2014
Date of Implementation 2/13/2014
Quoted Standard GM/T 0002-2012; GM/T 17964-2008; GM/T 0001-2012; GM/T 0003-2012; GM/T 0009-2012; GM/T 0010-2012; GM/T 0015-2012; ISO/IEC 9797-2; GM/T 0004-2012; GB/T 15843.2-2008; GB/T 15843.3-2008; GB/T 15843.4-2008; GB/T 15843.5-2005; ISO/IEC 11770-2; ISO/IEC 11770-3;
Regulation (derived from) The industry standard for the record Notice 2014 No. 4 (No. 172 overall)
Issuing agency(ies) State Administration of Cryptography
Summary This standard specifies the cryptographic modules to protect sensitive computer and telecommunications systems within the information security system is used, the provisions of the safety requirements. The standard for cryptographic modules defined four s


View full details