ANSI INCITS ISO IEC 10118-1-2000 Information technology - Security techniques Hash-functions Part 1 General.pdf
《ANSI INCITS ISO IEC 10118-1-2000 Information technology - Security techniques Hash-functions Part 1 General.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 10118-1-2000 Information technology - Security techniques Hash-functions Part 1 General.pdf(12页珍藏版)》请在麦多课文档分享上搜索。
1、Reference numberISO/IEC 10118-1:2000(E)ISO/IEC 2000INTERNATIONALSTANDARDISO/IEC10118-1Second edition2000-06-15Information technology Securitytechniques Hash-functions Part 1:GeneralTechnologies de linformation Techniques de scurit Fonctionsde brouillage Partie 1: GnralitsAdopted by INCITS (InterNati
2、onal Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 11/15/00Published by American National Standards Institute,25 West 43rd Street, New York, New York 10036Copyright 2002 by Information Technology Industry Council (ITI).All rights reserved.The
3、se materials are subject to copyright claims of International Standardization Organization (ISO), InternationalElectrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council(ITI). Not for resale. No part of this publication may be reprodu
4、ced in any form, including an electronic retrieval system, withoutthe prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW,Washington, DC 20005.Printed in the United States of AmericaISO/IEC 10118-1:2000(E)PDF disclaimerThis PDF fil
5、e may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall notbe edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading thisfile, parties accept therein the re
6、sponsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in thisarea.Adobe is a trademark of Adobe Systems Incorporated.Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creatio
7、n parameterswere optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely eventthat a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO 2000All rights reserved. Unless othe
8、rwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronicor mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member bodyin the country of the requester.ISO copyright o
9、fficeCase postale 56 Gb7 CH-1211 Geneva 20Tel. + 41 22 749 01 11Fax + 41 22 734 10 79E-mail copyrightiso.chWeb www.iso.chPrinted in Switzerlandii ISO/IEC 2000 All rights reservedISO/IEC 10118-1:2000(E) ISO/IEC 2000 All rights reserved iiiForewordISO (the International Organization for Standardizatio
10、n) and IEC (the International Electrotechnical Commission)form the specialized system for worldwide standardization. National bodies that are members of ISO or IECparticipate in the development of International Standards through technical committees established by therespective organization to deal
11、with particular fields of technical activity. ISO and IEC technical committeescollaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, inliaison with ISO and IEC, also take part in the work.International Standards are drafted in accordance with
12、the rules given in the ISO/IEC Directives, Part 3.In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting.Publication as an Inte
13、rnational Standard requires approval by at least 75 % of the national bodies casting a vote.Attention is drawn to the possibility that some of the elements of this part of ISO/IEC 10118 may be the subject ofpatent rights. ISO and IEC shall not be held responsible for identifying any or all such pate
14、nt rights.International Standard ISO/IEC 10118-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Informationtechnology, Subcommittee SC 27, IT Security techniques.This second edition cancels and replaces the first edition (ISO/IEC 10118-1:1994), which has been technicallyrevised to add a ge
15、neral model for hash-functions. Note, however, that implementations which comply withISO/IEC 10118-1:1994 will be compliant with this edition of ISO/IEC 10118-1.ISO/IEC 10118 consists of the following parts, under the general title Information technology Securitytechniques Hash-functions:Gbe Part 1:
16、 GeneralGbe Part 2: Hash-functions using an n-bit block cipher algorithmGbe Part 3: Dedicated hash-functionsGbe Part 4: Hash-functions using modular arithmeticAnnex A forms a normative part of this part of ISO/IEC 10118.INTERNATIONAL STANDARD ISO/IEC 10118-1:2000(E) ISO/IEC 2000 All rights reserved
17、1Information technology Security techniques Hash-functions Part 1:General1 ScopeISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity andnon-repudiation services. Hash-functions map arbitrary strings of bits to a fixed-length strings of bits
18、, using aspecified algorithm. They can be used for- reducing a message to a short imprint for input to a digital signature mechanism, and- committing the user to a given string of bits without revealing this string.NOTE - The hash-functions specified in this part of ISO/IEC 10118 do not involve the
19、use of secret keys. However,these hash-functions may be used, in conjunction with secret keys, to build message authentication codes.Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. For thecalculation of a MAC the user is referred to ISO/IEC 9797.T
20、his part of ISO/IEC 10118 contains definitions, symbols, abbreviations and requirements, that are common to allthe other parts of ISO/IEC 10118.2 Normative referencesISO/IEC 9797 (all parts), Information technology Security techniques Message Authentication Codes (MACs).3 Terms and definitionsFor th
21、e purposes of this part of ISO/IEC 10118, the following terms and definitions apply.3.1big-endiana method of storage of multi-byte numbers with the most significant bytes at the lowest memory addresses3.2collision-resistant hash-functiona hash-function satisfying the following property: it is comput
22、ationally infeasible to find any two distinct inputs whichmap to the same outputNOTE computational feasibility depends on the specific security requirements and environment.3.3data string (data)a string of bits which is the input to a hash-functionThe following normative documents contain provisions
23、 which, through reference in this text, constitute provisions ofthis part of ISO/IEC 10118. For dated references, subsequent amendments to, or revisions of, any of thesepublications do not apply. However, parties to agreements based on this part of ISO/IEC 10118 are encouraged toinvestigate the poss
24、ibility of applying the most recent editions of the normative documents indicated below. Forundated references, the latest edition of the normative document referred to applies. Members of ISO and IECmaintain registers of currently valid International Standards.ISO/IEC 10118-1:2000(E)2 ISO/IEC 2000
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC1011812000INFORMATIONTECHNOLOGYSECURITYTECHNIQUESHASHFUNCTIONSPART1GENERALPDF

链接地址:http://www.mydoc123.com/p-435974.html