1
/
of
12
www.ChineseStandard.us -- Field Test Asia Pte. Ltd.
GM/T 0028-2014 English PDF (GM/T0028-2014)
GM/T 0028-2014 English PDF (GM/T0028-2014)
Regular price
$365.00
Regular price
Sale price
$365.00
Unit price
/
per
Shipping calculated at checkout.
Couldn't load pickup availability
GM/T 0028-2014: Security requirements for cryptographic modules
Delivery: 9 seconds. Download (and Email) true-PDF + Invoice.Get Quotation: Click GM/T 0028-2014 (Self-service in 1-minute)
Newer / historical versions: GM/T 0028-2014
Preview True-PDF
Scope
This Standard, for the cryptographic modules which are used to protect thesecurity system of sensitive information in computer and telecommunications
systems, specifies security requirements. The Standard defines 4 security
levels for cryptographic modules, to meet the security requirements of different
degrees of sensitive information and many application fields. For the 11 security
domains of cryptographic modules, this Standard gives the corresponding
requirements of the four security levels. The high security level, on the basis of
the low security level, further improves security.
Basic Data
Standard ID | GM/T 0028-2014 (GM/T0028-2014) |
Description (Translated English) | Security requirements for cryptographic modules |
Sector / Industry | Chinese Industry Standard (Recommended) |
Classification of Chinese Standard | L80 |
Classification of International Standard | 35.040 |
Word Count Estimation | 61,661 |
Date of Issue | 2/13/2014 |
Date of Implementation | 2/13/2014 |
Quoted Standard | GM/T 0002-2012; GM/T 17964-2008; GM/T 0001-2012; GM/T 0003-2012; GM/T 0009-2012; GM/T 0010-2012; GM/T 0015-2012; ISO/IEC 9797-2; GM/T 0004-2012; GB/T 15843.2-2008; GB/T 15843.3-2008; GB/T 15843.4-2008; GB/T 15843.5-2005; ISO/IEC 11770-2; ISO/IEC 11770-3; |
Regulation (derived from) | The industry standard for the record Notice 2014 No. 4 (No. 172 overall) |
Issuing agency(ies) | State Administration of Cryptography |
Summary | This standard specifies the cryptographic modules to protect sensitive computer and telecommunications systems within the information security system is used, the provisions of the safety requirements. The standard for cryptographic modules defined four s |
Share











