Skip to product information
1 of 12

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GM/T 0042-2015 English PDF (GMT0042-2015)

GM/T 0042-2015 English PDF (GMT0042-2015)

Regular price $555.00 USD
Regular price Sale price $555.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: In 1-minute, 24-hr self-service. Click here GM/T 0042-2015 to get it for Purchase Approval, Bank TT...

GM/T 0042-2015: Test specification for cryptography and security protocol in tri-element peer architecture

This standard specifies the basic technical requirements of the tri-element peer architecture cryptography security protocol for the relevant cryptography algorithm and security protocol as well as the corresponding test methods, it is applicable to the detection of tri-element peer cryptography security protocol-related products.
GM/T 0042-2015
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 35.040
L 80
File No.. 49741-2015
Test specification for cryptography and security
protocol in tri-element peer architecture
ISSUED ON. APRIL 01, 2015
IMPLEMENTED ON. APRIL 01, 2015
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
Introduction .. 5
1 Scope .. 6
2 Normative references ... 6
3 Terms and definitions ... 7
4 Symbols and abbreviations ... 8
5 Basic technical requirements ... 9
5.1 Correctness and consistency requirements of cryptographic algorithm implementation .. 9
5.2 Conformity and interoperability requirements for protocol implementation ... 10 5.3 Other requirements .. 11
6 Test environment requirements ... 11
6.1 Test equipment .. 11
6.2 Test topology... 12
7 Unified sealing of cryptography and security protocol test in tri-element peer architecture ... 14
7.1 Definition of unified sealing data structure ... 14
7.2 Definitions of unified sealing data element ... 16
8 Test method of cryptographic algorithm implementation correctness and consistency ... 17
8.1 Test method of symmetric cryptographic algorithm implementation
correctness and consistency ... 17
8.2 Test methods of digital signature algorithm implementation correctness and consistency .. 17
8.3 Test methods of key exchange protocol implementation correctness and consistency .. 18
8.4 Test methods of public key encryption algorithm implementation correctness and consistency... 18
8.5 Test methods of digital certificate format ... 19
8.6 Test methods of cryptographic hash algorithm ... 19
8.7 Test methods of random number ... 20
9 Test methods for protocol implementation consistency and interoperability ... 20
9.1 Port control test method... 20
9.2 TAEP protocol sealing test method ... 21
9.3 TAEPoL protocol sealing test method .. 22
9.4 TCP/UDP port test method ... 22
Appendix A (Informative) TAEP protocol sealing Request and Response group Type definition ... 23
Appendix B (Normative) Unified sealing data element of cryptography and security protocol test in tri-element peer architecture .. 25
Appendix C (Normative) Equipment naming ... 36
Appendix D (Informative) Test vector ... 38
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of
Cryptography Industry Standardization Technical Committee.
Main drafting organizations of this Standard. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory on
Wireless Network Security Technology, State Cryptography Administration Commercial Password Detection Center, National Wireless Monitoring Center Detection Center, China Telecom Corporation, China Aerospace Science and Industry Corporation 2nd Institute 706 office, China Electronics Technology Group Corporation 15th Institute, National Information Center, China PLA General Political Department 61st Institute, Beijing Municipal Affairs Network Management Center, WAPI Industry Alliance, Guangzhou Jiesai Technology
Co., Ltd., Shenzhen Minghua Aohan Technology Co., Ltd., Ministry of Public Security Information Security Rating Protection Evaluation Center, Beijing CECT Huada Electronic Design Co., Ltd.
Main drafters of this Standard. Cao Jun, Li Qin, Huang Zhenhai, Li Dawei, Deng Kaiyong, Hu Ya?€?nan, Song Qizhu, Gao Bo, Kong Lei, Luo Peng, Li Guoyou, Li Guang, Wu Yafei, Yang Lin, Li Yanchun, Qin Zhiqiang, Zhou Tao, Zhu Zhengmei, Yao Rui, Zhan Baorong, Shen Yuchao, Pan Qi, Shi Qianjun, Du Zhiqiang, Yan Xiang, Wang Yuehui, Zhang Bianling, Tie Manxia, Zhang Qiang, Zhang
Guoqiang, Li Ming, Zhang Sha, Ding Qifeng, Liu Hu, Yang Feng, Huang Li, Pan Yiming, Tong Weigang, Wang Lei, and so on.
Test specification for cryptography and security
protocol in tri-element peer architecture
1 Scope
This standard specifies the basic technical requirements of the tri-element peer architecture cryptography security protocol for the relevant cryptography algorithm and security protocol as well as the corresponding test methods, it is applicable to the detection of tri-element peer cryptography security protocol- related products. It mainly includes the following contents.
a) Technical requirements and test methods for the correctness and
consistency of cryptography algorithm implementation;
b) Basic technical requirements and test methods for compliance and
interoperability of the protocol implementation.
This standard applies to the equipment complying with ISO/IEC 9798-
3.1998/Amd.1.2010, GB/T 15843.3, GB/T 28455-2012, it is used to detect
whether its cryptography algorithm and protocol implementation comply with the requirements of the above standards.
2 Normative references
The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard.
GB/T 15843.3 Information technology - Security techniques - Entity
authentication - Part 3. Mechanisms using digital signature techniques
GB/T 28455-2012 Information security technology - Entity authentication involving a trusted third party and access architecture specification
GM/T 0002 SM4 block cipher algorithm
GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves GM/T 0004 SM3 password hashing algorithm
GM/T 0005 Randomness test specification
successfully completed, both systems allow the other party to access the services provided by their controlled port.
5.2.2 TAEP protocol sealing requirements
The data sealing of the authentication protocol in the cryptography and security protocol in tri-element peer architecture shall meet the sealing requirements of the TAEP protocol defined in GB/T 28455-2012.
The Type field in the TAEP Request and Response grouping formats is used to indicate the type of the Request and Response groups. See Appendix A for definition.
5.2.3 TAEP sealing (TAEPol) protocol requirements on the link
GB/T 28455-2012 defines sealing techniques for the loading TAEP groups
between requester PAE and authentication access controller PAE. The sealing indicates the TAEP on the link as the TAEPoL. The TAEPoL protocol uses the 0x891b Ether type field.
5.2.4 Underlay and transport layer protocol sealing requirements
The TAEP message is transmitted between the authentication access controller and the authentication server using the TAEP-AS-SVC service protocol
specified in GB/T 28455-2012. The authentication server receives the TAEP message on the UDP/TCP port 5111 as the server end and authentication
access controller sends the TAEP message as a client.
5.3 Other requirements
Products need to consider self-test, and the product reliability and stability shall meet the specific scenario requirements of the product application.
In accordance with the implementation of the protocol in the product, it may provide algorithm implementation correctness and random number self-test descriptions.
The security requirements of the cryptographic module in the product shall meet GM/T 0028.
6 Test environment requirements
6.1 Test equipment
The test equipment shall be subject to metrological verification, and within the 8 Test method of cryptographic algorithm
implementation correctness and consistency
8.1 Test method of symmetric cryptographic algorithm
implementation correctness and consistency
The test method is as follows.
a) Set up a test network to perform the interactions of cryptography and security protocol in tri-element peer architecture among the tested
equipment, standard equipment and support equipment;
b) The tested equipment and the support equipment seal the relevant data concerning the symmetric cryptographic algorithm in the interaction
information as received and sent in the interaction process of the
cryptography and security protocol in tri-element peer architecture as well as the known relevant data in accordance with the unified sealing
requirements of the cryptography and security protocol test in tri-element peer architecture as defined in 7.1, and submit it to the test platform; c) The test platform parses it to get the data field related to the symmetric cryptographic algorithm test, uses these data fields to perform the
correctness and consistency test of the symmet...

View full details