GB/T 37092-2018 (English Version) Information Security Technology-Security Requirements For Cryptographic Modules
GB/T 37092-2018 (English Version) Information Security Technology-Security Requirements For Cryptographic Modules
net
ICS 35.040
L 80
(English Translation)
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
Contents
Foreword ............................................................................................................................... i
Introduction .......................................................................................................................... ii
1 Scope .............................................................................................................................1
2 Normative references ..................................................................................................... 1
3 Terms and definitions ..................................................................................................... 1
4 Abbreviations.................................................................................................................. 4
5 Security level of cryptographic module............................................................................. 5
5.1 Overview .............................................................................................................. 5
5.2 Security Level 1 ................................................................................................... 6
5.3 Security Level 2 ................................................................................................... 6
5.4 Security Level 3 ................................................................................................... 7
5.5 Security Level 4 ................................................................................................... 8
6 Functional security targets ............................................................................................. 9
7 Security requirements .................................................................................................... 9
7.1 General requirements .......................................................................................... 9
7.2 Cryptographic module specification .................................................................. 12
7.3 Cryptographic module interfaces ....................................................................... 17
7.4 Roles, services, and authentication ................................................................... 19
7.5 Software/firmware security ................................................................................ 26
7.6 Operational environment ................................................................................... 28
7.7 Physical security ................................................................................................ 34
7.8 Non-invasive security......................................................................................... 44
7.9 Sensitive security parameter management ....................................................... 45
7.10 Self-tests .......................................................................................................... 50
7.11 Life-cycle assurance ........................................................................................ 56
7.12 Mitigation of other attacks ................................................................................ 62
Annex A (Normative) Documentation requirements ....................................................... 64
Annex B (Normative) Cryptographic module security policy .......................................... 72
Annex C (Normative) Approved security functions ......................................................... 79
Annex D (Normative) Approved sensitive security parameter generation and
establishment methods ...................................................................................................... 81
Annex E (Normative) Approved authentication mechanisms ......................................... 82
Annex F (Normative) Non-invasive attacks and mitigation method detection indicators
...........................................................................................................................................83
Bibliography ....................................................................................................................... 85
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
Foreword
ChinaStandards.net is in charge of this English translation. In case of any doubt about the
English translation, the Chinese original shall be considered authoritative.
This standard is developed in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by and is under the jurisdiction of the National Technical
Committee on Information Security of Standardization Administration of China (SAC/TC
260).
Chief drafters of this standard: Jing Jiwu, Gao Neng, Tu Chenyang, Zheng Fangyu, Jiang
Weiyu, Zhou Guoliang, Liu Zongbin, Liu Zeyi, Wang Jing, Luo Peng, Wang Xuelin, Chen
Guo, Zhan Banghua, Zhu Pengfei, Jiang Hongyu, Chen Yue, Zhang Wantao, Liu Limin
and Xiang Ji.
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
Introduction
This standard provides four progressive and qualitative security levels for the
cryptographic modules, but doesn't specify the correct application and secure deployment
of a cryptographic module. During the use or deployment of cryptographic module, the
operator of cryptographic module is responsible for ensuring that the security provided by
the module is sufficient and acceptable to the owner of the information, and that any
residual risk is informed to the owner of the information. The operator of cryptographic
module is responsible for selecting a cryptographic module of appropriate security level to
ensure that the cryptographic module adapts to security requirements necessary for
application and the security state of environment where it is used.
ii
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
1 Scope
This standard specifies the security requirements for cryptographic modules, and defines
four security levels for cryptographic modules and corresponding requirements.
2 Normative references
The following referenced documents are indispensable for the application of this
document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
For the purposes of this document, the terms and definitions given in GB/T 25069 and the
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
following apply.
3.1
certificate
data of an entity, which is issued by the certification authority's private key or secret key
and cannot be forged
3.2
conditional self-test
test performed by a cryptographic module when specified test conditions occur
3.3
critical security parameter
security relevant secret information which may endanger the security of cryptographic
module once disclosed or modified
3.4
cryptographic boundary
clearly defined perimeter that establishes physical and/or logical boundaries and includes
all hardware, software and/or firmware components of the cryptographic module
3.5
cryptographic module
set of hardware, software and/or firmware implementing security function, which is
included within the cryptographic boundary
Note: cryptographic modules may be classified into hardware cryptographic module, firmware
cryptographic module, software cryptographic module and hybrid cryptographic module according to
composition.
3.6
cryptographic module interface
logical entry or exit of a cryptographic module, providing access for logical information
flow
3.7
cryptographic module security policy
clear description of security rules which shall be complied with by cryptographic module,
including the rules derived from the requirements of this standard and those required by
the vendor
3.8
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
3.9
fault induction
technology causing change of operational behavior in hardware by applying transient
voltage, radiation, laser or clock offset technology
3.10
multi-word authentication
authentication containing at least two independent authentication factors
Note: categories of independent authentication factors include: something known, something possessed
mater and property possessed.
3.11
non-invasive attack
attack on cryptographic module, which is not in direct physical contact with the
components within the cryptographic boundary, and does not change the state of the
cryptographic module
3.12
operational environment
set of all software, firmware and hardware required for secure operation of cryptographic
module, including operating system and hardware platform
Note: the operational environment is classified into modifiable operational environment, limited
operational environment and unmodifiable operational environment.
3.13
pre-operational self-test
test performed by a cryptographic module between the time a cryptographic module is
powered on or instantiated (after being powered off, reset, rebooted, cold-start, power
interruption, etc.) and before the module transition to the operational state
3.14
public security parameter
security relevant public information which may endanger the security of cryptographic
module once modified
Note: for example, public key, public key certificate, self-signed certificate, trust anchor, one-time
password associated with the counter and the date and time kept internally. If the public security
parameter cannot be modified or can be discovered by the cryptographic module after being modified,
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
3.15
runtime environment
virtual machine state that provides software service for processes and programs while the
computer is running
Note: the runtime environment may be related to the operating system or the software running under it.
Its main purpose is to achieve a "platform-independent" programming target.
3.16
security function
cryptographic algorithm and its working mode, including: block cipher, stream cipher,
asymmetric cipher, message authentication code, hash function, random number
generation, entity authentication, generation and establishment of sensitive security
parameters, etc.
3.17
sensitive security parameters
including critical security parameter (3.3) and public security parameter (3.14)
3.18
simple power analysis
direct (mainly visual) analysis on (single) command execution mode, which is related to
the power consumption of cryptographic module and used to obtain information related to
cryptographic operation
3.19
split knowledge
process in which a key is split into multiple key components and output from cryptographic
module to multiple entities. Single component cannot provide knowledge of the original
key. The key component entered into cryptographic module by each entity can be
synthesized into the original key, which may require all components or a part of them
3.20
sensitive security parameter establishment
process of providing shared sensitive security parameters to one entity or more entities
Note: sensitive security parameter establishment includes negotiation, transfer and entry/output of
sensitive security parameter.
4 Abbreviations
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
5.1 Overview
A cryptographic module refers to the hardware, software, firmware or the set of them,
implementing functions such as cryptographic operation and key management. This
standard is applicable to cryptographic modules used in security systems protecting the
sensitive information in computer and telecommunications system. In order to protect the
cryptographic modules and the sensitive security parameters contained in and controlled
by the cryptographic modules as well as to meet the security requirements in many
application fields and of different levels, this standard specifies four progressing security
levels, among which, the high-level ones are improved based on low-level ones. Common
examples given in this standard are used to illustrate how to meet the security
requirements hereof other than for restriction or enumeration. Four security levels are
outlined below. The cryptographic techniques are identical over the four security levels.
In this standard, each security requirement is identified and numbered by a "shall [xx.yy]"
where xx indicates the clause and yy is a numeric index of the clause. If "shall [xx.yy]"
occurs in certain sentence in this standard, it means that this sentence is a security
requirement of this standard with serial number of [xx.yy]. There are 12 clauses in total in
this standard, corresponding to the common security requirements and 11 security
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
Each sentence in this standard thereinafter containing "shall [xx.yy]" shall be considered a
security requirement of the cryptographic module; such identification may be directly cited
by the corresponding subsequent detection standard of this standard and cited by
documentation submitted by the cryptographic module vendor.
Security Level 1 provides a baseline level of security. Security Level 1 clarifies the basic
security requirements for cryptographic modules. For example, a cryptographic module
shall use at least one approved security function or sensitive security parameter
establishment method. A software or firmware cryptographic module may run in an
unmodifiable, limited or modifiable operational environment. A hardware cryptographic
module is unnecessary to reach other special physical security mechanism requirements
except for the basic requirements for production-grade components. Mitigation methods
implemented by the cryptographic module against non-invasive attack or other attacks
shall be documented. Examples of cryptographic modules of Security Level 1 are:
hardware encryption card in personal computer, cryptographic toolkit running on handheld
device or general-purpose computer.
Cryptographic module of Security Level 1 is well suitable when the application system
outside the cryptographic module has been configured with measures such as physical
security, network security and management process, thus allowing the user of
cryptographic module to choose from various cryptographic solutions to meet security
needs.
For Security Level 2, requirements for tamper evidence are added based on Security
Level 1, such as using tamper-evident coatings or seals or pick-resistant locks on
removable covers or doors.
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
authenticates the role of an operator to determine if the operator has the right to perform
corresponding services.
The cryptographic module at Security Level 3 shall protect against a security compromise
due to voltage and temperature outside of the cryptographic module's normal operating
ranges. Intentional excursions beyond the normal operating ranges may be used by an
attacker to bypass a cryptographic module's defense. A cryptographic module shall either
include environmental protection features designed to detect abnormal environment and
zeroize critical security parameters, or to pass environmental failure testing to provide a
reasonable assurance that the cryptographic module security will not be damaged by
abnormal environment.
The cryptographic module of Security Level 3 shall provide evidence and testing methods
for the validity of non-invasive attack mitigation techniques.
Security Level 3 is not offered in all clauses of this standard for software cryptographic
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
modules, therefore, the overall highest security level achievable by software cryptographic
module is limited to Security Level 2.
Security Level 4 provides the highest level of security defined in this standard. This level
includes all security features of the lower levels, as well as extended features.
At Security Level 4, the physical security mechanisms shall provide a complete envelope
for protection around the cryptographic module with the intent of detecting and responding
to all unauthorized attempts at physical access when sensitive security parameters are
contained in the cryptographic module whether external power is supplied or not.
Penetration of the cryptographic module enclosure from any direction has a very high
probability of being detected, resulting in the immediate zeroization of all unprotected
sensitive security parameters. By virtue of high security mechanism, Security Level 4
cryptographic modules are useful for operation in physically unprotected environment.
The cryptographic module at Security Level 4 shall protect against a security f due to
voltage and temperature outside of the cryptographic module's normal operating ranges.
A cryptographic module shall include environmental protection features designed to detect
abnormal environment and zeroize critical security parameters, to provide a reasonable
assurance that the cryptographic module security will not be compromised by abnormal
environment.
The mitigation methods for non-invasive attacks specified in 7.8 and implemented in
cryptographic modules are detected according to the non-invasive attack mitigation
detection indicators for Security Level 4 specified by the relevant national departments.
The design of a Security Level 4 module is verified by the correspondence between both
pre- and post-conditions and the functional specification.
https://www.chinastandards.net/standard/GBT37092-2018.html
https://www.ChinaStandards.net -> Buy the full version pdf -> Delivered by [email protected]
The security requirements specified in this standard involves the security design and
implementation of cryptographic modules. Security requirements begin at the lowest level
of the security target and increase as the security target level increases. These
requirements are derived from the following functional security targets of cryptographic
modules:
——employ and correctly implement the approved security functions to protect sensitive
information;
——detect errors in the operation of cryptographic modules, prevent these errors from
unauthorized disclosure, modification, replacement or use of critical security parameter, or
unauthorized modification or replacement of public security parameter;
7 Security requirements
https://www.chinastandards.net/standard/GBT37092-2018.html