2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GM/T 0129-2023
GM/T 0129-2023   Secure shell cryptography protocol specification (English Version)
Standard No.: GM/T 0129-2023 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 12500 words Translation Price(USD):375.0 remind me the price change

Email:

Implemented on:2024-6-1 Delivery: via email in 1 business day

→ → →

,,2024-6-1,C57E8E16BB3A7FE51717912042097
Standard No.: GM/T 0129-2023
English Name: Secure shell cryptography protocol specification
Chinese Name: SSH密码协议规范
Chinese Classification: L80    Data encryption
Professional Classification: GM    
Source Content Issued by: Office of Security Commercial Code Administration
Issued on: 2023-12-04
Implemented on: 2024-6-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 12500 words
Translation Price(USD): 375.0
Delivery: via email in 1 business day
GM/T 0129-2023 Secure shell cryptography protocol specification 1 Scope This document specifies the secure shell cryptography protocol, the encrypted transport protocol, the authentication protocol, the connection protocol of the interactive tunnel, and the usage method of the cryptographic algorithm in the protocol. This document is applicable to the development and testing of SSH server and SSH client products. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 15852.1 Information technology - Security techniques - Message authentication codes - Part 1: Mechanisms using a block cipher GB/T 15852.2 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function GB/T 33560 Information security technology - Cryptographic application identifier criterion specification GB/T 35275 Information security technology - SM2 cryptographic algorithm encrypted signature message syntax specification GB/T 35276 Information security technology - SM2 cryptographic algorithm usage specification GM/T 0015 Digital certificate format based on SM2 algorithm GM/Z 4001 Cryptology terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GM/Z 4001 apply. 4 Abbreviations For the purposes of this document, the following abbreviations apply. CR: Carriage-Return LF: Line-Feed SP: Space SSH: Secure Shell 5 Protocol framework 5.1 General The SSH cryptography protocol is a protocol suite composed of the transport layer protocol, authentication protocol, and connection protocol. It is used for secure remote login and secure network service on insecure networks. The transport layer protocol and authentication protocol may also form security application services such as sftp and scp together with other services. In the process of establishing the SSH cryptography protocol, firstly, a secure communication channel is established by the transport layer protocol; then, the authentication protocol is used to authenticate the identities of the client and server on this secure communication channel; finally, after the authentication is completed, the corresponding SSH service is established on the secure communication channel by the connection protocol. 5.2 Transport layer protocol The transport layer protocol provides server authentication, confidentiality, and integrity. The transport layer protocol may run on a TCP connection and may also be used on other reliable data streams. 5.3 Authentication protocol The authentication protocol is used by the server to authenticate the identity of the client user. The authentication protocol runs on the transport layer protocol. 5.4 Connection protocol The connection protocol is used to multiplex an encrypted tunnel into several logical channels. The connection protocol runs on the authentication protocol. The connection protocol may be used to provide various network services, including the interactive environment (shell), port forwarding, and X11 connection.
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Protocol framework 5.1 General 5.2 Transport layer protocol 5.3 Authentication protocol 5.4 Connection protocol 6 Cryptographic algorithms and key types 6.1 Cryptographic algorithm 6.2 Key types 7 Definitions of data types 7.1 Algorithm identifier 7.2 Basic data types 8 Transport layer protocol 8.1 General 8.2 Protocol flow 8.3 Protocol version 8.4 Packet 8.5 Key agreement 8.6 Service request 8.7 Disconnection 9 Authentication protocol 9.1 General 9.2 Protocol flow 9.3 Packet 9.4 Password-based authentication method 9.5 Authentication method based on the asymmetric key 9.6 Authentication method based on the digital certificate 10 Connection protocol 10.1 General 10.2 Connection channel 10.3 Packet Bibliography
Referred in GM/T 0129-2023:
*GB/T 15852.1-2020 Information technology—Security techniques—Message authentication codes—Part 1:Mechanisms using a block cipher
*GB/T 15852.2-2012 Information technology—Security techniques—Message Authentication Codes (MACs)—Part 2:Mechanisms using a dedicated hash-function
*GB/T 33560-2017 Information security technology—Cryptographic application identifier criterion specification
*GB/T 35275-2017 Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification
*GB/T 35276-2017 Information security technology―SM2 cryptography algorithm usage specification
*GM/T 0015-2023 Digital certificate format
*GMZ4001-
Code of China
Standard
GM/T 0129-2023  Secure shell cryptography protocol specification (English Version)
Standard No.GM/T 0129-2023
Statusvalid
LanguageEnglish
File FormatPDF
Word Count12500 words
Price(USD)375.0
Implemented on2024-6-1
Deliveryvia email in 1 business day
Detail of GM/T 0129-2023
Standard No.
GM/T 0129-2023
English Name
Secure shell cryptography protocol specification
Chinese Name
SSH密码协议规范
Chinese Classification
L80
Professional Classification
GM
ICS Classification
Issued by
Office of Security Commercial Code Administration
Issued on
2023-12-04
Implemented on
2024-6-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
12500 words
Price(USD)
375.0
Keywords
GM/T 0129-2023, GM 0129-2023, GMT 0129-2023, GM/T0129-2023, GM/T 0129, GM/T0129, GM0129-2023, GM 0129, GM0129, GMT0129-2023, GMT 0129, GMT0129
Introduction of GM/T 0129-2023
GM/T 0129-2023 Secure shell cryptography protocol specification 1 Scope This document specifies the secure shell cryptography protocol, the encrypted transport protocol, the authentication protocol, the connection protocol of the interactive tunnel, and the usage method of the cryptographic algorithm in the protocol. This document is applicable to the development and testing of SSH server and SSH client products. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 15852.1 Information technology - Security techniques - Message authentication codes - Part 1: Mechanisms using a block cipher GB/T 15852.2 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function GB/T 33560 Information security technology - Cryptographic application identifier criterion specification GB/T 35275 Information security technology - SM2 cryptographic algorithm encrypted signature message syntax specification GB/T 35276 Information security technology - SM2 cryptographic algorithm usage specification GM/T 0015 Digital certificate format based on SM2 algorithm GM/Z 4001 Cryptology terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GM/Z 4001 apply. 4 Abbreviations For the purposes of this document, the following abbreviations apply. CR: Carriage-Return LF: Line-Feed SP: Space SSH: Secure Shell 5 Protocol framework 5.1 General The SSH cryptography protocol is a protocol suite composed of the transport layer protocol, authentication protocol, and connection protocol. It is used for secure remote login and secure network service on insecure networks. The transport layer protocol and authentication protocol may also form security application services such as sftp and scp together with other services. In the process of establishing the SSH cryptography protocol, firstly, a secure communication channel is established by the transport layer protocol; then, the authentication protocol is used to authenticate the identities of the client and server on this secure communication channel; finally, after the authentication is completed, the corresponding SSH service is established on the secure communication channel by the connection protocol. 5.2 Transport layer protocol The transport layer protocol provides server authentication, confidentiality, and integrity. The transport layer protocol may run on a TCP connection and may also be used on other reliable data streams. 5.3 Authentication protocol The authentication protocol is used by the server to authenticate the identity of the client user. The authentication protocol runs on the transport layer protocol. 5.4 Connection protocol The connection protocol is used to multiplex an encrypted tunnel into several logical channels. The connection protocol runs on the authentication protocol. The connection protocol may be used to provide various network services, including the interactive environment (shell), port forwarding, and X11 connection.
Contents of GM/T 0129-2023
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Protocol framework 5.1 General 5.2 Transport layer protocol 5.3 Authentication protocol 5.4 Connection protocol 6 Cryptographic algorithms and key types 6.1 Cryptographic algorithm 6.2 Key types 7 Definitions of data types 7.1 Algorithm identifier 7.2 Basic data types 8 Transport layer protocol 8.1 General 8.2 Protocol flow 8.3 Protocol version 8.4 Packet 8.5 Key agreement 8.6 Service request 8.7 Disconnection 9 Authentication protocol 9.1 General 9.2 Protocol flow 9.3 Packet 9.4 Password-based authentication method 9.5 Authentication method based on the asymmetric key 9.6 Authentication method based on the digital certificate 10 Connection protocol 10.1 General 10.2 Connection channel 10.3 Packet Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GM/T 0129-2023, GM 0129-2023, GMT 0129-2023, GM/T0129-2023, GM/T 0129, GM/T0129, GM0129-2023, GM 0129, GM0129, GMT0129-2023, GMT 0129, GMT0129