2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0039-2015
GM/T 0039-2015   Security Test Requirements for Cryptographic Modules (English Version)
Standard No.: GM/T 0039-2015 Status:superseded remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 50000 words Translation Price(USD):360.0 remind me the price change

Email:

Implemented on:2015-4-1 Delivery: via email in 1 business day

→ → →

2025-07-01,2024-12-27,2015-4-1,9B4487AFE510D9001430404450261
Standard No.: GM/T 0039-2015
English Name: Security Test Requirements for Cryptographic Modules
Chinese Name: 密码模块安全检测要求
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2025-07-01
Implemented on: 2015-4-1
Status: superseded
Superseded by:GM/T 0039-2024 Security Test Requirements for Cryptographic Modules
Superseded on:2024-12-27
Abolished on:2025-07-01
Target Language: English
File Format: PDF
Word Count: 50000 words
Translation Price(USD): 360.0
Delivery: via email in 1 business day
Security Test Requirements for Cryptographic Modules 1 Scope In accordance with the requirements of GM/T 0028-2014, this standard specifies requirements on a series of test procedures, methods and corresponding vendor documentation for cryptographic modules. This standard is applicable to tests of cryptographic modules. 2 Normative References The following documents are essential for the application of this Standard. For dated reference, just dated edition applies to this document. For undated references, the latest edition (including any amendments) applies to this document. GM/T 0028-2014 Technical Requirements for Cryptographic Module Security GM/Z 4001 Cryptography Terminologies 3 Terms and Definitions For the purpose of this Standard, the terms and definitions in GM/T 0028-2014 and GM/Z 4001 apply. 4 Acronyms The following acronyms apply in this document. API Application Program Interface CBC Cipher Block Chaining CSP Critical Security Parameter EDC Error Detection Code EFP Environmental Failure Protection EFT Environmental Failure Testing FSM Finite State Model HDL Hardware Description Language IC Integrated Circuit PIN Personal Identification Number PROM Programmable Read-Only Memory PSP Public Security Parameter RAM Random Access Memory RBG Random Bit Generator ROM Read-Only Memory SSP Sensitive Security Parameter 5 Document Organization 5.1 General Clause 6 of this document specifies the procedures and methods that shall be used by testing laboratories and the requirements for information that vendors shall provide to testing laboratories. Clause 6 includes 18 subclauses: general requirements are specified in 6.1; and 6.2~6.18 correspond to the eleven areas of security requirements and the Annexes A to F in GM/T 0028-2014. 5.2 Assertions and Security Requirements Within each subclause in Clause 6, the corresponding security requirements from GM/T 0028-2014 are divided into a set of assertions. All of the assertions are direct quotations from GM/T 0028-2014 and expressed in bold font. The assertions are denoted by the form: AY. Where "AY" means security requirement, “requirement_number” is the number of the corresponding area specified in GM/T 0028-2014 (i.e., one through twelve and A through F), and “sequence_number” is a sequential identifier for assertions within a subclause. After the number of each assertion, the security levels to which the assertion applies are listed in parentheses. After the statement of each assertion, the requirements on the vendor documentation required are stated. These requirements describe the types of documentation or explicit information that the vendor shall provide in order for the tester to verify conformity to the given assertion. These requirements are denoted by the form: CY.. Where "CY" means the requirements on the vendor documentation, “requirement_number” and “assertion_sequence_number” are identical to the corresponding assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for vendor requirements within the assertion requirement. Also following the vendor documentation is a set of requirements on the test procedures. These requirements instruct the tester as to what he or she shall do in order to test the cryptographic module with respect to the given assertion. These requirements are denoted by the form: JY.. Where "JY" means the requirements on test procedures and method, “requirement_number” and “assertion_sequence_number” are identical to the corresponding assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for tester requirements within the assertion requirement. 5.3 Assertions with Cross References For clarity in some assertions, cross references to GM/T 0028-2014 or other assertions numbers have been put between curly brackets “{“ and ”}”. Those cross references are written in italics. 6 Security Requirements 6.1 General Note: this subclause states general requirements to meet the assertions of the other subclauses in Clause 6. AY01.01: (Levels 1, 2, 3, and 4) This Clause specifies the security requirements that shall be satisfied by the cryptographic module’s compliance to this standard. Note: this assertion is not separately tested. AY01.02: (Levels 1, 2, 3, and 4) A cryptographic module shall be tested against the requirements of each area. Note 1: the tests can be performed by the testing laboratories in one or more of the following manners: a) Tester performs tests at the testing laboratory’s facility b) Tester performs tests at the vendor’s facility c) Tester supervises vendor performing tests at the vendor’s facility. In such case,
1 Scope 2 Normative References 3 Terms and Definitions 4 Acronyms 5 Document Organization 5.1 General 5.2 Assertions and Security Requirements 5.3 Assertions with Cross References 6 Security Requirements 6.1 General 6.2 Cryptographic Module Specification 6.3 Cryptographic Module Interfaces 6.4 Roles, Services, and Authentication 6.5 Software/Firmware security 6.6 Operational environment 6.7 Physical security 6.8 Non-invasive Security 6.10 Self-tests 6.11 Life-cycle Assurance 6.12 Mitigation of Other Attacks 6.13 A-Documentation Requirements 6.14 B-Cryptographic Module Security Policy 6.15 C-Approved Security Functions 6.16 D-Approved sensitive Security Parameter Generation and Establishment Methods 6.17 E-Approved Authentication Mechanisms 6.18 F-Approved Non-invasive Attack Mitigation Test Metrics Annex A (Informative) Security Level Corresponding Table
GM/T 0039-2015 is referred in:
*GM/T 0066-2019 Implementation guide to capability construction criteria of production and guarantee for commercial cryptographic products
*GM/T 0054-2018 General requirements for information system cryptography application
Code of China
Standard
GM/T 0039-2015  Security Test Requirements for Cryptographic Modules (English Version)
Standard No.GM/T 0039-2015
Statussuperseded
LanguageEnglish
File FormatPDF
Word Count50000 words
Price(USD)360.0
Implemented on2015-4-1
Deliveryvia email in 1 business day
Detail of GM/T 0039-2015
Standard No.
GM/T 0039-2015
English Name
Security Test Requirements for Cryptographic Modules
Chinese Name
密码模块安全检测要求
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2025-07-01
Implemented on
2015-4-1
Status
superseded
Superseded by
GM/T 0039-2024 Security Test Requirements for Cryptographic Modules
Superseded on
2024-12-27
Abolished on
2025-07-01
Superseding
Language
English
File Format
PDF
Word Count
50000 words
Price(USD)
360.0
Keywords
GM/T 0039-2015, GM 0039-2015, GMT 0039-2015, GM/T0039-2015, GM/T 0039, GM/T0039, GM0039-2015, GM 0039, GM0039, GMT0039-2015, GMT 0039, GMT0039
Introduction of GM/T 0039-2015
Security Test Requirements for Cryptographic Modules 1 Scope In accordance with the requirements of GM/T 0028-2014, this standard specifies requirements on a series of test procedures, methods and corresponding vendor documentation for cryptographic modules. This standard is applicable to tests of cryptographic modules. 2 Normative References The following documents are essential for the application of this Standard. For dated reference, just dated edition applies to this document. For undated references, the latest edition (including any amendments) applies to this document. GM/T 0028-2014 Technical Requirements for Cryptographic Module Security GM/Z 4001 Cryptography Terminologies 3 Terms and Definitions For the purpose of this Standard, the terms and definitions in GM/T 0028-2014 and GM/Z 4001 apply. 4 Acronyms The following acronyms apply in this document. API Application Program Interface CBC Cipher Block Chaining CSP Critical Security Parameter EDC Error Detection Code EFP Environmental Failure Protection EFT Environmental Failure Testing FSM Finite State Model HDL Hardware Description Language IC Integrated Circuit PIN Personal Identification Number PROM Programmable Read-Only Memory PSP Public Security Parameter RAM Random Access Memory RBG Random Bit Generator ROM Read-Only Memory SSP Sensitive Security Parameter 5 Document Organization 5.1 General Clause 6 of this document specifies the procedures and methods that shall be used by testing laboratories and the requirements for information that vendors shall provide to testing laboratories. Clause 6 includes 18 subclauses: general requirements are specified in 6.1; and 6.2~6.18 correspond to the eleven areas of security requirements and the Annexes A to F in GM/T 0028-2014. 5.2 Assertions and Security Requirements Within each subclause in Clause 6, the corresponding security requirements from GM/T 0028-2014 are divided into a set of assertions. All of the assertions are direct quotations from GM/T 0028-2014 and expressed in bold font. The assertions are denoted by the form: AY. Where "AY" means security requirement, “requirement_number” is the number of the corresponding area specified in GM/T 0028-2014 (i.e., one through twelve and A through F), and “sequence_number” is a sequential identifier for assertions within a subclause. After the number of each assertion, the security levels to which the assertion applies are listed in parentheses. After the statement of each assertion, the requirements on the vendor documentation required are stated. These requirements describe the types of documentation or explicit information that the vendor shall provide in order for the tester to verify conformity to the given assertion. These requirements are denoted by the form: CY.. Where "CY" means the requirements on the vendor documentation, “requirement_number” and “assertion_sequence_number” are identical to the corresponding assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for vendor requirements within the assertion requirement. Also following the vendor documentation is a set of requirements on the test procedures. These requirements instruct the tester as to what he or she shall do in order to test the cryptographic module with respect to the given assertion. These requirements are denoted by the form: JY.. Where "JY" means the requirements on test procedures and method, “requirement_number” and “assertion_sequence_number” are identical to the corresponding assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for tester requirements within the assertion requirement. 5.3 Assertions with Cross References For clarity in some assertions, cross references to GM/T 0028-2014 or other assertions numbers have been put between curly brackets “{“ and ”}”. Those cross references are written in italics. 6 Security Requirements 6.1 General Note: this subclause states general requirements to meet the assertions of the other subclauses in Clause 6. AY01.01: (Levels 1, 2, 3, and 4) This Clause specifies the security requirements that shall be satisfied by the cryptographic module’s compliance to this standard. Note: this assertion is not separately tested. AY01.02: (Levels 1, 2, 3, and 4) A cryptographic module shall be tested against the requirements of each area. Note 1: the tests can be performed by the testing laboratories in one or more of the following manners: a) Tester performs tests at the testing laboratory’s facility b) Tester performs tests at the vendor’s facility c) Tester supervises vendor performing tests at the vendor’s facility. In such case,
Contents of GM/T 0039-2015
1 Scope 2 Normative References 3 Terms and Definitions 4 Acronyms 5 Document Organization 5.1 General 5.2 Assertions and Security Requirements 5.3 Assertions with Cross References 6 Security Requirements 6.1 General 6.2 Cryptographic Module Specification 6.3 Cryptographic Module Interfaces 6.4 Roles, Services, and Authentication 6.5 Software/Firmware security 6.6 Operational environment 6.7 Physical security 6.8 Non-invasive Security 6.10 Self-tests 6.11 Life-cycle Assurance 6.12 Mitigation of Other Attacks 6.13 A-Documentation Requirements 6.14 B-Cryptographic Module Security Policy 6.15 C-Approved Security Functions 6.16 D-Approved sensitive Security Parameter Generation and Establishment Methods 6.17 E-Approved Authentication Mechanisms 6.18 F-Approved Non-invasive Attack Mitigation Test Metrics Annex A (Informative) Security Level Corresponding Table
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0039-2015, GM 0039-2015, GMT 0039-2015, GM/T0039-2015, GM/T 0039, GM/T0039, GM0039-2015, GM 0039, GM0039, GMT0039-2015, GMT 0039, GMT0039