Skip to product information
1 of 8

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GM/T 0035.3-2014 English PDF (GMT0035.3-2014)

GM/T 0035.3-2014 English PDF (GMT0035.3-2014)

Regular price $145.00 USD
Regular price Sale price $145.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: In 1-minute, 24-hr self-service. Click here GM/T 0035.3-2014 to get it for Purchase Approval, Bank TT...

GM/T 0035.3-2014: Specifications of cryptographic application for RFID systems. Part 3: Specification of cryptographic application for RFID reader

This Part of GM/T 0035 specifies the security certification, data storage, communication security and the like security requirements of RFID reader adopted cryptographic technology; specifies the technical requirements of RFID system at different security levels against the cryptographic security of RFID reader. Appendix A gives an example of a RFID reader cryptographic security application.
GM/T 0035.3-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 35.040
L 80
Record No.. 44638-2014
Specifications of Cryptographic Application
for RFID Systems ?€? Part 3. Specification of
Cryptographic Application for RFID Reader
ISSUED ON. FEBRUARY 13, 2014
IMPLEMENTED ON. FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope .. 4
2 Normative References ... 4
3 Terms and Definitions ... 5
4 Symbols and Abbreviation .. 5
5 Basic Structure of RFID Reader .. 5
6 Cryptographic Security Factor .. 5
6.1 Confidentiality .. 5
6.2 Integrity ... 6
6.3 Non-repudiation .. 7
6.4 ID authentication ... 8
6.5 Access control ... 8
6.6 Audit record .. 8
6.7 Cryptographic configuration ... 9
6.8 Other secure measures ... 9
7 Technical Requirements for Cryptographic Security ... 9
Appendix A (Informative) Application Example for Cryptographic Security of RFID Reader ... 11
A.1 Security requirements for RFID reader .. 11
A.2 SAM command set ... 12
A.3 Key management ... 13
A.4 Access control .. 16
A.5 Two-way ID authentication between RFID reader and tag ... 18
A.6 Confidentiality and integrity .. 20
A.7 Non-repudiation ... 21
A.8 Communication security between RFID reader and host computer ... 21 Foreword
GM/T 0035 Specifications of Cryptographic Application for RFID Systems can be divided into 5 parts.
--- Part 1. Cryptographic Protection Framework and Security Levels;
--- Part 2. Specification of Cryptographic Application for RFID tag chip; --- Part 3. Specification of Cryptographic Application for RFID Reader; --- Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader;
--- Part 5. Specification for Key Management.
This Part belongs to Part 3 of GM/T 0035.
This Part shall be drafted as per the rules of GB/T 1.1-2009.
This Part was proposed and under the jurisdiction of Cryptographic Industry Standardization Technical Committee.
Drafting organizations of this Part. Beijing Zhongdian Huada Electronic Design Co., Ltd., Shanghai Hsic Application System Co., Ltd., Aisino Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Xingtang Communication Technology Co., Ltd., Fudan University, Beijing Tongfang Micro-Electronics Co., Ltd., Shanghai Huahong Integrated Circuit Co., Ltd., and Beijing Huada Zhibao Electronic System Co., Ltd. Chief drafting staffs of this Part. Dong Haoran, Zhou Jiansuo, Wang Yunsong, Xu Shumin, Chen Yue, Gu Zhen, Yu Jun, Wu Xingjun, Wang Junfeng, Xie Wenlu, Liang Shaofeng, Fan Nandi, Wan Junyu, Liu Xun, and Wang Huibo.
Specifications of Cryptographic Application
for RFID Systems ?€? Part 3. Specification of
Cryptographic Application for RFID Reader
1 Scope
This Part of GM/T 0035 specifies the security certification, data storage, communication security and the like security requirements of RFID reader adopted cryptographic technology; specifies the technical requirements of RFID system at different security levels against the cryptographic security of RFID reader. Appendix A gives an example of a RFID reader cryptographic security application.
This Part is applicable to the design, development, manufacture and application of RFID reader adopted cryptographic technology.
2 Normative References
The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this document.
GM/T 0035.1-2014 Specifications of Cryptographic Application for RFID Systems. Part 1. Cryptographic Protection Framework and Security Levels
GM/T 0035.2-2014 Specification of Cryptographic Application for RFID Systems ?€? Part 2. Specification of Cryptographic Application for RFID Tag Chip
GM/T 0035.4-2014 Specifications of Cryptographic Application for RFID Systems - Part 4. Specification of Cryptographic Application for Communication between RFID Tag and Reader
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems - Part 5. Specification for Key Management
The RFID reader performs encryption protection by using cryptographic algorithm against the sensitive information in the RFID reader; so that the damage, failure or unauthorized access of any part of the RFID reader shall not cause the leakage of the sensitive information; so that ensure the confidentiality of data storage in RFID reader. The confidentiality protection of storage information shall be finished through the encryption of cryptographic algorithm.
When adopting the block encryption of symmetric cryptographic algorithm, use LD to indicate the length of plaintext data; generate new data block by adding LD before the plaintext data; such data block shall be grouped as per the block length of the cryptographic algorithm; if the length of the final block of data is less than the block length of cryptographic algorithm, it shall be filled and supplemented. The filling mode shall be filling one byte of hexadecimal system ?€?80?€? behind the final block of data; if it is still less than the block length of cryptographic algorithm, then fill the ?€?00?€? till the block length. After the data is grouped, use cryptographic algorithm and encrypted key to encrypt such data block by block then store them. When reading such data, use the same cryptographic algorithm and encrypted key to decrypt such stored ciphertext data; and intersect to obtain the intact plaintext data according to the plaintext data length LD.
6.1.2 Confidentiality of transmission data
When performing communication between RFID reader and tag, the RFID reader shall perform encrypted protection against the transmitted sensitive information by cryptographic algorithm; ensure after such transmitted data is intersected, the plaintext data can?€?t be obtained; so as to meet the confidentiality requirements of transmission data.
The confidentiality protection of transmission data shall be finished through encrypting the transmitted plaintext data; the stream encryption or block encryption modes shall be adopted.
The realization process for the confidentiality of transmission data shall refer to GM/T 0035.4-2014.
6.2 Integrity
6.2.1 Integrity of storage information
The RFID reader performs verification and calculation against the sensitive information stored in the RFID reader by cryptographic algorithm; so that find whether the data has been tampered, deleted and inserted, etc.; ensure the integrity of storage information. The integrity protection of storage information shall adopt cryptographic algorithm; which is performed through adding check code to the storage information. The specific ??? 32KB EEPROM. used for the storage of data and programs
??? 256KB FLASH. used for the storage of programs, function libraries and data ??? MMU. memory management unit, which supports 4 operating modes
??? Random number generator
??? Security detection. detection of high-and-low frequency; detection of high-and-low voltage
??? UART interface
??? Support the SM1/SM4, SM2, SM3, SM7 cryptographic algorithms
A.1.2 Security levels
The security level of RFID system is Level-2.
The function of RFID tag is the same as the Appendix A in GM/T 0035.2-2014; support the domestic SM7 cryptographic algorithm.
A.1.3 Cryptographic security requirements for RFID reader
According to the security requirements for system, the RFID reader supports the following security elements.
a) Confidentiality of storage information;
b) integrity of storage information;
c) Confidentiality of transmission information with RFID tag;
d) Origin non-repudiation of RFID tag;
e) Two-way challenge response ID authentication between RFID reader and tag; f) Access control.
In addition, the RFID reader supports the confidentiality and integrity of transmission information with the host computer, ID authentication, access control, non-repudiation, and the like security elements.
A.2 SAM command set
The instructions for the command set supported by SAM can refer to Table A.1. event
NOTE. the cipher machine indicates the cryptographic device adopted by the host computer when ensuring the key generation, ticket issuing, communication security between the host computer and RFID reader.
A.3.3 Key entry
The distribution and entry of RFID reader key shall be performed in the key management center; according to the different applications of the RFID reader, different keys are entered into the RFID reader; enter 3 keys into the ticket-verifying reader in this application, which include SM1/SM4 Key KB of the ticket-verifying key o...

View full details