Skip to product information
1 of 11

PayPal, credit cards. Download editable-PDF & invoice in 1 second!

GM/T 0035.1-2014 English PDF (GMT0035.1-2014)

GM/T 0035.1-2014 English PDF (GMT0035.1-2014)

Regular price $145.00 USD
Regular price Sale price $145.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: In 1-minute, 24-hr self-service. Click here GM/T 0035.1-2014 to get it for Purchase Approval, Bank TT...

GM/T 0035.1-2014: Specifications of cryptographic application for RFID systems. Part 1: Cryptographic protection framework and security levels

This Part of GM/T 0035 specifies the cryptographic protection framework and security levels of RFID system; and the correlation with GM/T 0035.2-2014, GM/T 0035.3-2014, GM/T 0035.4-2014, GM/T 0035.5-2014. Appendix A gives an example of cryptographic security scheme for RFID system. This Part is applicable to the design, implementation and application for cryptographic security of RFID system.
GM/T 0035.1-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 35.040
L 80
Record No.. 44636-2014
Specifications of Cryptographic Application
for RFID Systems ?€? Part 1. Cryptographic
Protection Framework and Security Levels
ISSUED ON. FEBRUARY 13, 2014
IMPLEMENTED ON. FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative References ... 4
3 Terms and Definitions ... 4
4 Symbols and Abbreviation .. 9
5 Security of RFID system .. 9
5.1 Cryptographic protection framework of RFID system .. 9
5.2 Cryptographic application technology standard framework of RFID system ... 10
5.3 Cryptographic protection framework and security levels .. 11
5.4 RFID tag security .. 11
5.5 Reader security ... 11
5.6 Communication security between RFID tag and reader .. 12
5.7 Key management ... 12
6 Security Level Classification and Technical Requirements of RFID System ... 12
6.1 Level classification .. 12
6.2 All-level cryptographic security technology requirements ... 13
7 Distribution of Cryptographic Algorithm ... 16
Appendix A (Informative) Cryptographic Security Solution for RFID Tag Anti- Counterfeiting Application ... 17
A.1 Solution summary .. 17
A.2 Cryptographic security technology and its realization of RFID tag chip ... 19 A.3 Cryptographic security technology and security realization of RFID tag reader ... 21
A.4 Communication security technology between RFID tag and reader ... 24 A.5 Cryptographic algorithm and key management... 26
Foreword
GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be divided into 5 parts.
--- Part 1. Cryptographic Protection Framework and Security Levels;
--- Part 2. Specification of Cryptographic Application for RFID tag chip; --- Part 3. Specification of Cryptographic Application for RFID Reader; --- Part 4. Specification of Cryptographic Application for Communication; --- Part 5. Specification for Key Management.
This Part belongs to Part 1 of GM/T 0035.
This Part shall be drafted as per the rules of GB/T 1.1-2009.
This Part was proposed and under the jurisdiction of Cryptographic Industry Standardization Technical Committee.
Drafting organizations of this Part. Shanghai HSIC Application System Co., Ltd., Fudan University, Shanghai Huahong Integrated Circuit Co., Ltd., Beijing Zhongdian Huada Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Xingtang Communication Technology Co., Ltd., Beijing Tongfang Micro-Electronics Co., Ltd., Aisino Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd. Chief drafting staffs of this Part. Gu Zhen, Dong Haoran, Wang Junyu, Xie Wenlu, Wang Yunsong, Liang Shaofeng, Yu Jun, Wu Xingjun, Wang Junfeng, Zhou Jiansuo, Xu Shumin, Chen Yue, Liu Xun, and Wang Huibo.
Specifications of Cryptographic Application
for RFID Systems ?€? Part 1. Cryptographic
Protection Framework and Security Levels
1 Scope
This Part of GM/T 0035 specifies the cryptographic protection framework and security levels of RFID system; and the correlation with GM/T 0035.2-2014, GM/T 0035.3-2014, GM/T 0035.4-2014, GM/T 0035.5-2014. Appendix A gives an example of cryptographic security scheme for RFID system.
This Part is applicable to the design, implementation and application for cryptographic security of RFID system.
2 Normative References
The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this document.
GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems ?€? Part 2. Specification of Cryptographic Application for RFID Tag Chip
GM/T 0035.3-2014 Specification of Cryptographic Application for RFID Systems ?€? Part 3. Specification of Cryptographic Application for RFID Reader
GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems - Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems - Part 5. Specification for Key Management
3 Terms and Definitions
The following terms and definitions are applicable to this document.
3.11 Confidentiality
The nature ensuring that the information is not exposed to the unauthorized individuals, processes and other entities.
3.12 Encipherment/Encryption
The process of generating ciphertext through cryptographic transmission of the data. 3.13 Authentication
Confirm the authenticity of an entity?€?s claimed identity or information. 3.14 Decipherment/Decryption
The inverse process corresponding to the encryption process.
3.15 Non-repudiation
Also known as undeniable; the mechanism proves that an operation or event has occurred and can?€?t deny.
3.16 Object
Information carrier.
3.17 Cryptographic module
Relatively independent software, hardware, firmware or their combination that perform cryptographic calculation function.
3.18 Cryptographic algorithm
Describe the calculation rules during the cryptographic processing procedure. 3.19 Cryptography protocol
Two or more participants use the cryptographic algorithm, in accordance with the agreed rules, to take a series of steps to achieve a particular purpose. 3.20 Cryptographic hash function
[Translator note. hash function has additional 2 nick-names in Chinese] mapping an arbitrarily long bit string to a function of fixed-length bit string; and satisfy the following characteristics.
a) It is computationally difficult to find out an input that can be mapped to the output for a given output;
5.6 Communication security between RFID tag and reader
The communication security elements between RFID tag and reader include confidentiality of transmission information, integrity of transmission information, ID authentication. Thereof, ID authentication includes unique identifier authentication, challenge response authentication from RFID tag to the reader, challenge response authentication from reader to RFID tag, two-way challenge response authentication between RFID tag and reader.
The relevant technical requirements shall refer to GM/T 0035.4-2014.
5.7 Key management
It specifies the RFID tag, reader and their communication related key management requirements when RFID system adopts cryptographic mechanism.
The relevant technical requirements shall refer to GM/T 0035.5-2014.
6 Security Level Classification and Technical
Requirements of RFID System
6.1 Level classification
It can be divided into four levels according to different RFID system of cryptographic security technical requirements; each level specifies the minimum security precautions that shall be supported by the RFID system; its security strength is gradually increased. The uses can choose the levels according to different security requirements. Level-1 is applicable to some applications with lower security requirements; it shall take the security mechanism of ID authentication.
Level-2 is applicable to some applications with certain security requirements; it shall take the security mechanism of ID authentication and access control;
Level-3 is applicable to some applications with higher security requirements; it shall take the security mechanism of confidentiality, integrity, non-repudiation, ID authentication, and access control;
Level-4 is applicable to some applications with highest security requirements; it shall take the security mechanism of confidentiality, integrity, non-repudiation, ID authentication, access control and audit, etc.
The following contents shall not be considered when classifying the cryptographic security levels.
The same as 6.2.1.2.1.
6.2.2.3.2 Key management
The same as 6.2.1.2.2.
6.2.3 Level-3
6.2.3.1 Confidentiality
It shall support the confidentiality protection function of storage information; so that it can take encryption protection against the sensitive information stored in the RFID tag; ensure that the unauthorized reader can?€?t obtain or modify such information. It shall support the confidentiality protection function of transmission information between the reader and RFID tag; so that it can take encryption protection against the communication information between reader and RFID tag; ensure that the information shall not be leaked or stolen.
6.2.3.2 Integrity
It shall support the integrity protection of the storage information; so that it can use cryptographic technology to verify the sensitive information stored in the RFID system; finally find out whether the i...

View full details