GM/T 0035.1-2014 English PDF (GMT0035.1-2014)
GM/T 0035.1-2014 English PDF (GMT0035.1-2014)
Regular price
$150.00 USD
Regular price
Sale price
$150.00 USD
Unit price
/
per
Delivery: 3 seconds. Download true-PDF + Invoice.
Get QUOTATION in 1-minute: Click GM/T 0035.1-2014
Historical versions: GM/T 0035.1-2014
Preview True-PDF (Reload/Scroll if blank)
GM/T 0035.1-2014: Specifications of cryptographic application for RFID systems. Part 1: Cryptographic protection framework and security levels
GM/T 0035.1-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Record No.. 44636-2014
Specifications of Cryptographic Application
for RFID Systems – Part 1. Cryptographic
Protection Framework and Security Levels
ISSUED ON. FEBRUARY 13, 2014
IMPLEMENTED ON. FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative References ... 4
3 Terms and Definitions ... 4
4 Symbols and Abbreviation .. 9
5 Security of RFID system .. 9
5.1 Cryptographic protection framework of RFID system .. 9
5.2 Cryptographic application technology standard framework of RFID system
... 10
5.3 Cryptographic protection framework and security levels .. 11
5.4 RFID tag security .. 11
5.5 Reader security ... 11
5.6 Communication security between RFID tag and reader .. 12
5.7 Key management ... 12
6 Security Level Classification and Technical Requirements of RFID System
... 12
6.1 Level classification .. 12
6.2 All-level cryptographic security technology requirements ... 13
7 Distribution of Cryptographic Algorithm ... 16
Appendix A (Informative) Cryptographic Security Solution for RFID Tag Anti-
Counterfeiting Application ... 17
A.1 Solution summary .. 17
A.2 Cryptographic security technology and its realization of RFID tag chip ... 19
A.3 Cryptographic security technology and security realization of RFID tag
reader ... 21
A.4 Communication security technology between RFID tag and reader ... 24
A.5 Cryptographic algorithm and key management... 26
Foreword
GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be
divided into 5 parts.
--- Part 1. Cryptographic Protection Framework and Security Levels;
--- Part 2. Specification of Cryptographic Application for RFID tag chip;
--- Part 3. Specification of Cryptographic Application for RFID Reader;
--- Part 4. Specification of Cryptographic Application for Communication;
--- Part 5. Specification for Key Management.
This Part belongs to Part 1 of GM/T 0035.
This Part shall be drafted as per the rules of GB/T 1.1-2009.
This Part was proposed and under the jurisdiction of Cryptographic Industry
Standardization Technical Committee.
Drafting organizations of this Part. Shanghai HSIC Application System Co., Ltd., Fudan
University, Shanghai Huahong Integrated Circuit Co., Ltd., Beijing Zhongdian Huada
Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd.,
Xingtang Communication Technology Co., Ltd., Beijing Tongfang Micro-Electronics Co.,
Ltd., Aisino Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd.
Chief drafting staffs of this Part. Gu Zhen, Dong Haoran, Wang Junyu, Xie Wenlu,
Wang Yunsong, Liang Shaofeng, Yu Jun, Wu Xingjun, Wang Junfeng, Zhou Jiansuo,
Xu Shumin, Chen Yue, Liu Xun, and Wang Huibo.
Specifications of Cryptographic Application
for RFID Systems – Part 1. Cryptographic
Protection Framework and Security Levels
1 Scope
This Part of GM/T 0035 specifies the cryptographic protection framework and security
levels of RFID system; and the correlation with GM/T 0035.2-2014, GM/T 0035.3-2014,
GM/T 0035.4-2014, GM/T 0035.5-2014. Appendix A gives an example of cryptographic
security scheme for RFID system.
This Part is applicable to the design, implementation and application for cryptographic
security of RFID system.
2 Normative References
The following documents are essential to the application of this document. For the
dated documents, only the versions with the dates indicated are applicable to this
document; for the undated documents, only the latest version (including all the
amendments) are applicable to this document.
GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems –
Part 2. Specification of Cryptographic Application for RFID Tag Chip
GM/T 0035.3-2014 Specification of Cryptographic Application for RFID Systems –
Part 3. Specification of Cryptographic Application for RFID Reader
GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems -
Part 4. Specification of Cryptographic Application for Communication between RFID
Tag and Reader
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems -
Part 5. Specification for Key Management
3 Terms and Definitions
The following terms and definitions are applicable to this document.
3.11 Confidentiality
The nature ensuring that the information is not exposed to the unauthorized individuals,
processes and other entities.
3.12 Encipherment/Encryption
The process of generating ciphertext through cryptographic transmission of the data.
3.13 Authentication
Confirm the authenticity of an entity’s claimed identity or information.
3.14 Decipherment/Decryption
The inverse process corresponding to the encryption process.
3.15 Non-repudiation
Also known as undeniable; the mechanism proves that an operation or event has
occurred and can’t deny.
3.16 Object
Information carrier.
3.17 Cryptographic module
Relatively independent software, hardware, firmware or their combination that perform
cryptographic calculation function.
3.18 Cryptographic algorithm
Describe the calculation rules during the cryptographic processing procedure.
3.19 Cryptography protocol
Two or more participants use the cryptographic algorithm, in accordance with the
agreed rules, to take a series of steps to achieve a particular purpose.
3.20 Cryptographic hash function
[Translator note. hash function has additional 2 nick-names in Chinese]
mapping an arbitrarily long bit string to a function of fixed-length bit string; and satisfy
the following characteristics.
a) It is computationally difficult to find out an input that can be mapped to the output
for a given output;
5.6 Communication security between RFID tag and reader
The communication security elements between RFID tag and reader include
confidentiality of transmission information, integrity of transmission information, ID
authentication. Thereof, ID authentication includes unique identifier authentication,
challenge response authentication from RFID tag to the reader, challenge response
authentication from reader to RFID tag, two-way challenge response authentication
between RFID tag and reader.
The relevant technical requirements shall refer to GM/T 0035.4-2014.
5.7 Key management
It specifies the RFID tag, reader and their communication related key management
requirements when RFID system adopts cryptographic mechanism.
The relevant technical requirements shall refer to GM/T 0035.5-2014.
6 Security Level Classification and Technical
Requirements of RFID System
6.1 Level classification
It can be divided into four levels according to different RFID system of cryptographic
security technical requirements; each level specifies the minimum security precautions
that shall be supported by the RFID system; its security strength is gradually increased.
The uses can choose the levels according to different security requirements.
Level-1 is applicable to some applications with lower security requirements; it shall
take the security mechanism of ID authentication.
Level-2 is applicable to some applications with certain security requirements; it shall
take the security mechanism of ID authentication and access control;
Level-3 is applicable to some applications with higher security requirement...
Get QUOTATION in 1-minute: Click GM/T 0035.1-2014
Historical versions: GM/T 0035.1-2014
Preview True-PDF (Reload/Scroll if blank)
GM/T 0035.1-2014: Specifications of cryptographic application for RFID systems. Part 1: Cryptographic protection framework and security levels
GM/T 0035.1-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Record No.. 44636-2014
Specifications of Cryptographic Application
for RFID Systems – Part 1. Cryptographic
Protection Framework and Security Levels
ISSUED ON. FEBRUARY 13, 2014
IMPLEMENTED ON. FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative References ... 4
3 Terms and Definitions ... 4
4 Symbols and Abbreviation .. 9
5 Security of RFID system .. 9
5.1 Cryptographic protection framework of RFID system .. 9
5.2 Cryptographic application technology standard framework of RFID system
... 10
5.3 Cryptographic protection framework and security levels .. 11
5.4 RFID tag security .. 11
5.5 Reader security ... 11
5.6 Communication security between RFID tag and reader .. 12
5.7 Key management ... 12
6 Security Level Classification and Technical Requirements of RFID System
... 12
6.1 Level classification .. 12
6.2 All-level cryptographic security technology requirements ... 13
7 Distribution of Cryptographic Algorithm ... 16
Appendix A (Informative) Cryptographic Security Solution for RFID Tag Anti-
Counterfeiting Application ... 17
A.1 Solution summary .. 17
A.2 Cryptographic security technology and its realization of RFID tag chip ... 19
A.3 Cryptographic security technology and security realization of RFID tag
reader ... 21
A.4 Communication security technology between RFID tag and reader ... 24
A.5 Cryptographic algorithm and key management... 26
Foreword
GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be
divided into 5 parts.
--- Part 1. Cryptographic Protection Framework and Security Levels;
--- Part 2. Specification of Cryptographic Application for RFID tag chip;
--- Part 3. Specification of Cryptographic Application for RFID Reader;
--- Part 4. Specification of Cryptographic Application for Communication;
--- Part 5. Specification for Key Management.
This Part belongs to Part 1 of GM/T 0035.
This Part shall be drafted as per the rules of GB/T 1.1-2009.
This Part was proposed and under the jurisdiction of Cryptographic Industry
Standardization Technical Committee.
Drafting organizations of this Part. Shanghai HSIC Application System Co., Ltd., Fudan
University, Shanghai Huahong Integrated Circuit Co., Ltd., Beijing Zhongdian Huada
Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd.,
Xingtang Communication Technology Co., Ltd., Beijing Tongfang Micro-Electronics Co.,
Ltd., Aisino Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd.
Chief drafting staffs of this Part. Gu Zhen, Dong Haoran, Wang Junyu, Xie Wenlu,
Wang Yunsong, Liang Shaofeng, Yu Jun, Wu Xingjun, Wang Junfeng, Zhou Jiansuo,
Xu Shumin, Chen Yue, Liu Xun, and Wang Huibo.
Specifications of Cryptographic Application
for RFID Systems – Part 1. Cryptographic
Protection Framework and Security Levels
1 Scope
This Part of GM/T 0035 specifies the cryptographic protection framework and security
levels of RFID system; and the correlation with GM/T 0035.2-2014, GM/T 0035.3-2014,
GM/T 0035.4-2014, GM/T 0035.5-2014. Appendix A gives an example of cryptographic
security scheme for RFID system.
This Part is applicable to the design, implementation and application for cryptographic
security of RFID system.
2 Normative References
The following documents are essential to the application of this document. For the
dated documents, only the versions with the dates indicated are applicable to this
document; for the undated documents, only the latest version (including all the
amendments) are applicable to this document.
GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems –
Part 2. Specification of Cryptographic Application for RFID Tag Chip
GM/T 0035.3-2014 Specification of Cryptographic Application for RFID Systems –
Part 3. Specification of Cryptographic Application for RFID Reader
GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems -
Part 4. Specification of Cryptographic Application for Communication between RFID
Tag and Reader
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems -
Part 5. Specification for Key Management
3 Terms and Definitions
The following terms and definitions are applicable to this document.
3.11 Confidentiality
The nature ensuring that the information is not exposed to the unauthorized individuals,
processes and other entities.
3.12 Encipherment/Encryption
The process of generating ciphertext through cryptographic transmission of the data.
3.13 Authentication
Confirm the authenticity of an entity’s claimed identity or information.
3.14 Decipherment/Decryption
The inverse process corresponding to the encryption process.
3.15 Non-repudiation
Also known as undeniable; the mechanism proves that an operation or event has
occurred and can’t deny.
3.16 Object
Information carrier.
3.17 Cryptographic module
Relatively independent software, hardware, firmware or their combination that perform
cryptographic calculation function.
3.18 Cryptographic algorithm
Describe the calculation rules during the cryptographic processing procedure.
3.19 Cryptography protocol
Two or more participants use the cryptographic algorithm, in accordance with the
agreed rules, to take a series of steps to achieve a particular purpose.
3.20 Cryptographic hash function
[Translator note. hash function has additional 2 nick-names in Chinese]
mapping an arbitrarily long bit string to a function of fixed-length bit string; and satisfy
the following characteristics.
a) It is computationally difficult to find out an input that can be mapped to the output
for a given output;
5.6 Communication security between RFID tag and reader
The communication security elements between RFID tag and reader include
confidentiality of transmission information, integrity of transmission information, ID
authentication. Thereof, ID authentication includes unique identifier authentication,
challenge response authentication from RFID tag to the reader, challenge response
authentication from reader to RFID tag, two-way challenge response authentication
between RFID tag and reader.
The relevant technical requirements shall refer to GM/T 0035.4-2014.
5.7 Key management
It specifies the RFID tag, reader and their communication related key management
requirements when RFID system adopts cryptographic mechanism.
The relevant technical requirements shall refer to GM/T 0035.5-2014.
6 Security Level Classification and Technical
Requirements of RFID System
6.1 Level classification
It can be divided into four levels according to different RFID system of cryptographic
security technical requirements; each level specifies the minimum security precautions
that shall be supported by the RFID system; its security strength is gradually increased.
The uses can choose the levels according to different security requirements.
Level-1 is applicable to some applications with lower security requirements; it shall
take the security mechanism of ID authentication.
Level-2 is applicable to some applications with certain security requirements; it shall
take the security mechanism of ID authentication and access control;
Level-3 is applicable to some applications with higher security requirement...