2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0128-2023
GM/T 0128-2023   Specification of datagram transport layer cryptography protocol (English Version)
Standard No.: GM/T 0128-2023 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 10500 words Translation Price(USD):315.0 remind me the price change

Email:

Implemented on:2024-6-1 Delivery: via email in 1 business day

→ → →

,,2024-6-1,96B1A8C481B1A5631717912040719
Standard No.: GM/T 0128-2023
English Name: Specification of datagram transport layer cryptography protocol
Chinese Name: 数据报传输层密码协议规范
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2023-12-04
Implemented on: 2024-6-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 10500 words
Translation Price(USD): 315.0
Delivery: via email in 1 business day
GM/T 0128-2023 Specification of datagram transport layer cryptography protocol 1 Scope This document specifies datagram transport layer cryptography protocol, including record layer protocols, handshake protocol suite, and key computation. This document is applicable to the development, testing, management and use of datagram transport layer cryptography protocol related products (such as gateways, terminals, etc.). 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 38636-2020 Information security technology - Transport layer cryptography protocol (TLCP) GM/Z 4001 Cryptology terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GM/Z 4001 and the following apply. 3.1 path maximum transmission unit minimum value of the link maximum transmission unit (MTU) that can be supported by any communication link on the path between the source node and the destination node of the communication 3.2 user datagram protocol connectionless transport protocol, which provides a method for applications to send encapsulated IP packets without establishing a connection 4 Abbreviations For the purposes of this document, the following abbreviations apply. AEAD: Authenticated Encryption with Associated Data DTLCP: Datagram Transport Layer Cryptography Protocol MAC: Message Authentication Codes PMTU: Path Maximum Transmission Unit UDP: User Datagram Protocol 5 Cryptographic algorithms and key types 5.1 General DTLCP is based on Transport Layer Cryptography Protocol (TLCP) and is improved focusing on the characteristics of user datagram protocol. It adopts cryptographic technology to provide confidentiality and data integrity between two applications using UDP protocol. The cryptographic algorithms used in the protocol include asymmetric cryptographic algorithm, block cipher algorithm, cryptographic hash algorithm, data expansion function and pseudo-random function (PRF). The types of keys used in the protocol include server key, client key, pre-master secret, master secret and work key. 5.2 Cryptographic algorithm 5.2.1 Asymmetric cryptographic algorithm It is used for identity authentication, digital signature, key exchange, etc. 5.2.2 Block cipher algorithm It is used for encryption protection of key exchange data and message data. The operation mode used shall be Galois Counter Mode (GCM) or Cipher Block Chaining (CBC) Mode. 5.2.3 Cryptographic hash algorithm It is used for checking the generation and integrity of symmetric keys. 5.2.4 Data expansion function P_hash The definition and usage method of P_hash function shall meet the requirements of 5.2.4 in GB/T 38636-2020. 5.2.5 Pseudo-random function (PRF) The calculation methods of PRF shall meet the requirements of 5.2.5 in GB/T 38636-2020. 5.3 Key types
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Cryptographic algorithms and key types 5.1 General 5.2 Cryptographic algorithm 5.3 Key types 6 Protocols 6.1 General 6.2 Definition of data type 6.3 Record layer protocol 6.4 Handshake protocol suite 6.5 Key computation Bibliography
Referred in GM/T 0128-2023:
*GB/T 38636-2020 Information security technology—Transport layer cryptography protocol(TLCP)
*GMZ4001-
Code of China
Standard
GM/T 0128-2023  Specification of datagram transport layer cryptography protocol (English Version)
Standard No.GM/T 0128-2023
Statusvalid
LanguageEnglish
File FormatPDF
Word Count10500 words
Price(USD)315.0
Implemented on2024-6-1
Deliveryvia email in 1 business day
Detail of GM/T 0128-2023
Standard No.
GM/T 0128-2023
English Name
Specification of datagram transport layer cryptography protocol
Chinese Name
数据报传输层密码协议规范
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2023-12-04
Implemented on
2024-6-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
10500 words
Price(USD)
315.0
Keywords
GM/T 0128-2023, GM 0128-2023, GMT 0128-2023, GM/T0128-2023, GM/T 0128, GM/T0128, GM0128-2023, GM 0128, GM0128, GMT0128-2023, GMT 0128, GMT0128
Introduction of GM/T 0128-2023
GM/T 0128-2023 Specification of datagram transport layer cryptography protocol 1 Scope This document specifies datagram transport layer cryptography protocol, including record layer protocols, handshake protocol suite, and key computation. This document is applicable to the development, testing, management and use of datagram transport layer cryptography protocol related products (such as gateways, terminals, etc.). 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 38636-2020 Information security technology - Transport layer cryptography protocol (TLCP) GM/Z 4001 Cryptology terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GM/Z 4001 and the following apply. 3.1 path maximum transmission unit minimum value of the link maximum transmission unit (MTU) that can be supported by any communication link on the path between the source node and the destination node of the communication 3.2 user datagram protocol connectionless transport protocol, which provides a method for applications to send encapsulated IP packets without establishing a connection 4 Abbreviations For the purposes of this document, the following abbreviations apply. AEAD: Authenticated Encryption with Associated Data DTLCP: Datagram Transport Layer Cryptography Protocol MAC: Message Authentication Codes PMTU: Path Maximum Transmission Unit UDP: User Datagram Protocol 5 Cryptographic algorithms and key types 5.1 General DTLCP is based on Transport Layer Cryptography Protocol (TLCP) and is improved focusing on the characteristics of user datagram protocol. It adopts cryptographic technology to provide confidentiality and data integrity between two applications using UDP protocol. The cryptographic algorithms used in the protocol include asymmetric cryptographic algorithm, block cipher algorithm, cryptographic hash algorithm, data expansion function and pseudo-random function (PRF). The types of keys used in the protocol include server key, client key, pre-master secret, master secret and work key. 5.2 Cryptographic algorithm 5.2.1 Asymmetric cryptographic algorithm It is used for identity authentication, digital signature, key exchange, etc. 5.2.2 Block cipher algorithm It is used for encryption protection of key exchange data and message data. The operation mode used shall be Galois Counter Mode (GCM) or Cipher Block Chaining (CBC) Mode. 5.2.3 Cryptographic hash algorithm It is used for checking the generation and integrity of symmetric keys. 5.2.4 Data expansion function P_hash The definition and usage method of P_hash function shall meet the requirements of 5.2.4 in GB/T 38636-2020. 5.2.5 Pseudo-random function (PRF) The calculation methods of PRF shall meet the requirements of 5.2.5 in GB/T 38636-2020. 5.3 Key types
Contents of GM/T 0128-2023
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Cryptographic algorithms and key types 5.1 General 5.2 Cryptographic algorithm 5.3 Key types 6 Protocols 6.1 General 6.2 Definition of data type 6.3 Record layer protocol 6.4 Handshake protocol suite 6.5 Key computation Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0128-2023, GM 0128-2023, GMT 0128-2023, GM/T0128-2023, GM/T 0128, GM/T0128, GM0128-2023, GM 0128, GM0128, GMT0128-2023, GMT 0128, GMT0128