BS ISO IEC 29192-5-2016 Information technology Security techniques Lightweight cryptography Hash-functions《信息技术 安全技术 轻量加密 散列函数》.pdf
《BS ISO IEC 29192-5-2016 Information technology Security techniques Lightweight cryptography Hash-functions《信息技术 安全技术 轻量加密 散列函数》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 29192-5-2016 Information technology Security techniques Lightweight cryptography Hash-functions《信息技术 安全技术 轻量加密 散列函数》.pdf(38页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 29192-5:2016 Information technology Security techniques Lightweight cryptography Part 5: Hash-functions BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06BS ISO/IEC 29192-5:2016 BRITISH STANDARD National foreword This British Standard is the UK implementati
2、on of ISO/IEC 29192-5:2016. The UK participation in its preparation was entrusted to Technical Committee IST/33/2, Cryptography and Security Mechanisms. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all
3、 the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Published by BSI Standards Limited 2016 ISBN 978 0 580 87701 8 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British
4、 Standard was published under the authority of the Standards Policy and Strategy Committee on 31 July 2016. Amendments issued since publication Date Text affectedBS ISO/IEC 29192-5:2016 Information technology Security techniques Lightweight cryptography Part 5: Hash-functions Technologies de linform
5、ation Techniques de scurit Cryptographie pour environnements contraints Partie 5: Fonctions de hachage INTERNATIONAL STANDARD ISO/IEC 29192-5 Reference number ISO/IEC 29192-5:2016(E) First edition 2016-08-01 ISO/IEC 2016 BS ISO/IEC 29192-5:2016ii ISO/IEC 2016 All rights reserved COPYRIGHT PROTECTED
6、DOCUMENT ISO/IEC 2016, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
7、 written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/
8、IEC 29192-5:2016(E)BS ISO/IEC 29192-5:2016ISO/IEC 29192-5:2016(E)Foreword iv Introduction v 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Symbols 3 5 Lightweight hash-functions optimized for hardware implementations 3 5.1 General . 3 5.2 PHOTON 3 5.2.1 General 3 5.2.2 PHOTON sp
9、ecific notation . 4 5.2.3 Domain extension algorithm . 4 5.2.4 Internal permutation . 5 5.3 SPONGENT .10 5.3.1 General.10 5.3.2 SPONGENT specific notation 10 5.3.3 Domain extension algorithm 10 5.3.4 Internal permutation 11 6 Lightweight hash-functions optimized for software implementations 12 6.1 G
10、eneral 12 6.2 Lesamnta-LW .13 6.2.1 General.13 6.2.2 Message padding 13 6.2.3 Lesamnta-LW specific notation 13 6.2.4 Compression function and domain extension .13 6.2.5 Block cipher 14 Annex A (normative) Object identifiers .17 Annex B (informative) Numerical examples 19 Annex C (informative) Featur
11、e tables .23 Bibliography .26 ISO/IEC 2016 All rights reserved iii Contents PageBS ISO/IEC 29192-5:2016ISO/IEC 29192-5:2016(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardi
12、zation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mut
13、ual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. The procedures used to develop this document a
14、nd those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2
15、(see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified during the development
16、of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement. For an explanation on the meaning of ISO specif
17、ic terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information The committee responsible for this document is ISO/IEC JTC 1, Information
18、technology, SC 27, IT Security techniques. ISO/IEC 29192 consists of the following parts, under the general title Information technology Security techniques Lightweight cryptography: Part 1: General Part 2: Block ciphers Part 3: Stream ciphers Part 4: Mechanisms using asymmetric techniques Part 5: H
19、ash-functions Further parts may follow.iv ISO/IEC 2016 All rights reservedBS ISO/IEC 29192-5:2016ISO/IEC 29192-5:2016(E) Introduction This part of ISO/IEC 29192 specifies lightweight hash-functions, which are tailored for implementation in constrained environments. ISO/IEC 29192-1 specifies the requ
20、irements for lightweight cryptography. A hash-function maps an arbitrary string of bits to a fixed-length string of bits. The International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) draw attention to the fact that it is claimed that compliance with th
21、is part of ISO/IEC 29192 may involve the use of patents. The ISO and IEC take no position concerning the evidence, validity and scope of these patent rights. The holders of these patent rights have assured the ISO and IEC that they are willing to negotiate licences under reasonable and non-discrimin
22、atory terms and conditions with applicants throughout the world. In this respect, the statements of the holders of these patent rights are registered with the ISO and IEC. Information may be obtained from the following: Nanyang Technological University - NTUitive Pte Ltd 16 Nanyang Drive, #01-109, I
23、nnovation Centre, Singapore 637722 Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights other than those identified above. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO (www.iso.org/patents
24、) and IEC (http:/ /patents.iec.ch) maintain on-line databases of patents relevant to their standards. Users are encouraged to consult the databases for the most up to date information concerning patents. ISO/IEC 2016 All rights reserved vBS ISO/IEC 29192-5:2016BS ISO/IEC 29192-5:2016Information tech
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC2919252016INFORMATIONTECHNOLOGYSECURITYTECHNIQUESLIGHTWEIGHTCRYPTOGRAPHYHASHFUNCTIONS 信息技术 安全技术

链接地址:http://www.mydoc123.com/p-396756.html