ANSI INCITS ISO IEC 10118-4-1998 Information technology - Security techniques Hash-functions Part 4 Hash-functions using modular arithmetic (Adopted by INCITS).pdf
《ANSI INCITS ISO IEC 10118-4-1998 Information technology - Security techniques Hash-functions Part 4 Hash-functions using modular arithmetic (Adopted by INCITS).pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC 10118-4-1998 Information technology - Security techniques Hash-functions Part 4 Hash-functions using modular arithmetic (Adopted by INCITS).pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、B CReference numberISO/IEC 10118-4:1998(E)INTERNATIONALSTANDARDISO/IEC10118-4First edition1998-12-15Information technology Securitytechniques Hash-functions Part 4:Hash-functions using modular arithmeticTechnologies de linformation Techniques de scurit Fonctionsde brouillage Partie 4: Fonctions de h
2、achage utilisant larithmtique modulaireAdopted by INCITS (InterNational Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 7/7/200Published by American National Standards Institute,25 West 43rd Street, New York, New York 10036Copyright 2003 by Inf
3、ormation Technology Industry Council (ITI).All rights reserved.These materials are subject to copyright claims of International Standardization Organization (ISO), InternationalElectrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Counci
4、l(ITI). Not for resale. No part of this publication may be reproduced in any form, including an electronic retrieval system, withoutthe prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW,Washington, DC 20005.Printed in the United
5、States of AmericaISO/IEC 10118-4:1998(E) ISO/IEC 1998All rights reserved. Unless otherwise specified, no part of this publication may be reproducedor utilized in any form or by any means, electronic or mechanical, including photocopying andmicrofilm, without permission in writing from the publisher.
6、ISO/IEC Copyright Office Case postale 56 CH-1211 Genve 20 SwitzerlandPrinted in SwitzerlandiiContents1 Scope .12 Normative reference .13 Terms and definitions.13.1 From ISO/IEC 10118-1.13.2 Unique to this part of ISO/IEC 10118.13.3 Conventions 24 Symbols and abbreviated terms24.1 From ISO/IEC 10118-
7、1.24.2 Unique to this part of ISO/IEC 10118.35 Requirements 46 Variables and values needed for the hash operation46.1 The length of the hash-code and of the modulus46.2 The modulus of the round-function 46.3 Initializing value 56.4 Exponent56.5 Reduction-function prime number57 Hashing procedure .57
8、.1 Preparation of the data string57.1.1 Padding the data string 57.1.2 Appending the length .57.1.3 Splitting the data string57.1.4 Expansion 57.2 Application of the round-function.5ISO/IECISO/IEC 10118-4:1998(E)iii7.3 The Reduction-function 67.3.1 Splitting the block Hq. 67.3.2 Extending the data s
9、tring. 67.3.3 Processing the half-blocks 67.3.4 Reduction 68 Hash-functions 68.1 MASH-1 68.2 MASH-2 7Annex A (informative) Examples . 9Annex B (informative) Additional Information 22Annex C (informative) Bibliography 23ISO/IEC 10118-4:1998(E)ISO/IECivForewordISO (the International Organization for S
10、tandardization) and IEC (the International Electrotechnical Commission)form the specialized system for worldwide standardization. National bodies that are members of ISO or IECparticipate in the development of International Standards through technical committees established by therespective organiza
11、tion to deal with particular fields of technical activity. ISO and IEC technical committeescollaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, inliaison with ISO and IEC, also take part in the work.In the field of information technology, IS
12、O and IEC have established a joint technical committee, ISO/IEC JTC 1.Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting.Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.
13、International Standard ISO/IEC 10118-4 was prepared by Joint Technical Committee ISO/IEC JTC 1, Informationtechnology, Subcommittee SC27, IT Security techniques.ISO/IEC 10118 consists of the following parts, under the general title Information technology Security techniques Hash-functions: Part 1: G
14、eneral Part 2: Hash-functions using an n-bit block cipher algorithm Part 3: Dedicated hash-functions Part 4: Hash-functions using modular arithmeticAnnexes A, B and C of this part of ISO/IEC 10118 are for information only.INTERNATIONAL STANDARD ISO/IEC ISO/IEC 10118-4:1998(E)1Information technology
15、Security techniques Hashfunctions Part 4:Hash-functions using modular arithmetic1 ScopeThis part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-func-tions, which are believed to be collision-resistant, compress messages of arbitrary but limited length
16、to a hash-codewhose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identificationscheme).The hash-functions specified in this part of ISO/IEC 10
17、118, known as MASH-1 and MASH-2 (Modular ArithmeticSecure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficientlength are already available. The two hash-functions differ only in the exponent used in the round-function.2 Normative referenceThe
18、following standard contains provisions which, through reference in this text, constitute provisions of this part ofISO/IEC 10118. At the time of publication, the edition indicated was valid. All standards are subject to revision andparties to agreements based on this part of ISO/IEC 10118 are encour
19、aged to investigate the possibility of applyingthe most recent edition of the standard indicated below. Members of IEC and ISO maintain registers of currentlyvalid International Standards.ISO/IEC 10118-1: 1994, Information technology Security techniques Hash-functions Part 1: General.3 Terms and def
20、initionsFor the purposes of this part of ISO/IEC 10118, the following definitions apply.3.1 From ISO/IEC 10118-1 collision-resistant hash-function data string (data) hash-code hash-function initializing value padding.3.2 Unique to this part of ISO/IEC 101183.2.1blocka string of bits of length L, whi
21、ch shall be an integer multiple of 16 (see also clause 6.1)EXAMPLE The length of the output Hjof the round-function.ISO/IEC 10118-4:1998(E)ISO/IEC23.2.2half-blocka string of bits of length L /2EXAMPLE Half the length of the block Hj.3.2.3hash-function identifiera byte identifying a specific hash-fun
22、ction3.2.4modulusa parameter which is a positive integer and a product of two distinct prime numbers3.2.5reduction-functiona function RED that is applied to the block Hqof length L to generate the hash-code H of length Lp3.2.6round-functiona function (.,.) that transforms two binary strings of lengt
23、h L to a binary string of length LNOTE It is used iteratively as part of a hash-function, where it combines an expanded data block of length L with theprevious output of length L .3.3 Conventions3.3.1 Bit orderingBit ordering in this part of ISO/IEC 10118 is as described in clause 3 of ISO/IEC 10118
24、-1.3.3.2 Converting a number to a stringDuring computation of the round-function, integers need to be converted to strings of L bits. Where this is required,the string of bits shall be made equal to the binary representation of the integer, with the left-most bit of the stringcorresponding to the mo
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIEC1011841998INFORMATIONTECHNOLOGYSECURITYTECHNIQUESHASHFUNCTIONSPART4HASHFUNCTIONSUSINGMODULARARITHMETICADOPTEDBYINCITSPDF

链接地址:http://www.mydoc123.com/p-435977.html