ANSI ISO IEC 10118-3-2003 Information technology - Security techniques Hash-functions Part 3 Dedicated hash-functions Adopted by INCITS《信息技术.安全技术.散列函数.第3部分 被INCITS采用专用散列函数》.pdf
《ANSI ISO IEC 10118-3-2003 Information technology - Security techniques Hash-functions Part 3 Dedicated hash-functions Adopted by INCITS《信息技术.安全技术.散列函数.第3部分 被INCITS采用专用散列函数》.pdf》由会员分享,可在线阅读,更多相关《ANSI ISO IEC 10118-3-2003 Information technology - Security techniques Hash-functions Part 3 Dedicated hash-functions Adopted by INCITS《信息技术.安全技术.散列函数.第3部分 被INCITS采用专用散列函数》.pdf(98页珍藏版)》请在麦多课文档分享上搜索。
1、Adopted by INCITS (InterNational Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 12/24/2003Published by American National Standards Institute,25 West 43rd Street, New York, New York 10036Copyright 2003 by Information Technology Industry Council
2、 (ITI).All rights reserved.These materials are subject to copyright claims of International Standardization Organization (ISO), InternationalElectrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council(ITI). Not for resale. No part of t
3、his publication may be reproduced in any form, including an electronic retrieval system, withoutthe prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW,Washington, DC 20005.Printed in the United States of AmericaReference numberISO
4、/IEC 10118-3:2003(E)ISO/IEC 2003INTERNATIONAL STANDARD ISO/IEC10118-3Second edition2003-05-01Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions Technologies de linformation Techniques de scurit Fonctions de brouillage Partie 3: Fonctions de brouillage ddies Co
5、pyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 10118-3:2003(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, thi
6、s file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secreta
7、riat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensur
8、e that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 2003 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or uti
9、lized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax
10、 + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2003 All rights reservedCopyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,- ISO/IEC 20
11、03 All rights reserved iiiContents PageForeword.vi1 Scope.12 Normative references 13 Terms and definitions14 Symbols (and abbreviated terms) 24.1 Symbols specified in ISO/IEC 10118-1.24.2 Symbols specific to this part 25 Requirements .36 Model for dedicated hash-functions 47 Dedicated Hash-Function
12、1 (RIPEMD-160)47.1 Parameters, functions and constants47.1.1 Parameters47.1.2 Byte ordering convention .47.1.3 Functions 57.1.4 Constants57.1.5 Initializing value .67.2 Padding method.77.3 Description of the round-function78 Dedicated Hash-Function 2 (RIPEMD-128)88.1 Parameters, functions and consta
13、nts88.1.1 Parameters88.1.2 Byte ordering convention .88.1.3 Functions 98.1.4 Constants98.1.5 Initializing value .98.2 Padding method.98.3 Description of the round-function99 Dedicated Hash-Function 3 (SHA-1) 109.1 Parameters, functions and constants119.1.1 Parameters119.1.2 Byte ordering convention
14、.119.1.3 Functions 119.1.4 Constants119.1.5 Initializing value .119.2 Padding method.129.3 Description of the round-function1210 Dedicated Hash-Function 4 (SHA-256) 1310.1 Parameters, functions and constants1310.1.1 Parameters1310.1.2 Byte ordering convention .1310.1.3 Functions 1310.1.4 Constants14
15、10.1.5 Initializing value .1410.2 Padding method.1410.3 Description of the round-function1411 Dedicated Hash-Function 5 (SHA-512) 1511.1 Parameters, functions and constants15ISO/IEC 10118-3:2003(E) Copyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleN
16、o reproduction or networking permitted without license from IHS-,-,-ISO/IEC 10118-3:2003(E) iv ISO/IEC 2003 All rights reserved11.1.1 Parameters. 1511.1.2 Byte ordering convention. 1611.1.3 Functions . 1611.1.4 Constants. 1611.1.5 Initializing value. 1711.2 Padding method 1711.3 Description of the r
17、ound-function. 1712 Dedicated Hash-Function 6 (SHA-384) . 1812.1 Parameters, functions and constants. 1912.1.1 Parameters. 1912.1.2 Byte ordering convention. 1912.1.3 Functions . 1912.1.4 Constants. 1912.1.5 Initializing value. 1912.2 Padding method 1912.3 Description of the round-function. 1913 Ded
18、icated Hash-Function 7 (WHIRLPOOL) 1913.1 Parameters, functions and constants. 2013.1.1 Parameters. 2013.1.2 Byte ordering convention. 2013.1.3 Functions . 2013.1.4 Constants. 2113.1.5 Initializing value. 2113.2 Padding method 2113.3 Description of the round-function. 22Annex A (informative) Example
19、s. 23A.1 Dedicated Hash-Function 1 23A.1.1 Example 1. 23A.1.2 Example 2. 23A.1.3 Example 3. 23A.1.4 Example 4. 25A.1.5 Example 5. 25A.1.6 Example 6. 25A.1.7 Example 7. 25A.1.8 Example 8. 25A.1.9 Example 9. 28A.1.10 Example 10. 28A.1.11 Example 11. 28A.2 Dedicated Hash-Function 2 28A.2.1 Example 1. 2
20、8A.2.2 Example 2. 29A.2.3 Example 3. 29A.2.4 Example 4. 30A.2.5 Example 5. 30A.2.6 Example 6. 30A.2.7 Example 7. 30A.2.8 Example 8. 31A.2.9 Example 9. 33A.2.10 Example 10. 33A.2.11 Example 11. 33A.3 Dedicated Hash-Function 3 34A.3.1 Example 1. 34A.3.2 Example 2. 34A.3.3 Example 3. 34A.3.4 Example 4.
21、 35A.3.5 Example 5. 36A.3.6 Example 6. 36A.3.7 Example 7. 36Copyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 10118-3:2003(E) ISO/IEC 2003 All rights reserved vA.3.8 Exampl
22、e 8 .36A.3.9 Example 9 .39A.3.10 Example 10 .39A.3.11 Example 11 .39A.4 Dedicated Hash-Function 4.39A.4.1 Example 1 .39A.4.2 Example 2 .40A.4.3 Example 3 .40A.4.4 Example 4 .41A.4.5 Example 5 .42A.4.6 Example 6 .42A.4.7 Example 7 .42A.4.8 Example 8 .42A.4.9 Example 9 .45A.4.10 Example 10 .45A.4.11 E
23、xample 11 .46A.5 Dedicated Hash-Function 5.46A.5.1 Example 1 .46A.5.2 Example 2 .46A.5.3 Example 3 .46A.5.4 Example 4 .50A.5.5 Example 5 .50A.5.6 Example 6 .50A.5.7 Example 7 .50A.5.8 Example 8 .50A.5.9 Example 9 .51A.5.10 Example 10 .51A.5.11 Example 11 .57A.6 Dedicated Hash-Function 6.57A.6.1 Exam
24、ple 1 .57A.6.2 Example 2 .58A.6.3 Example 3 .58A.6.4 Example 4 .61A.6.5 Example 5 .61A.6.6 Example 6 .61A.6.7 Example 7 .62A.6.8 Example 8 .62A.6.9 Example 9 .62A.6.10 Example 10 .62A.6.11 Example 11 .69A.7 Dedicated Hash-Function 7.69A.7.1 Example 1 .69A.7.2 Example 2 .69A.7.3 Example 3 .69A.7.4 Ex
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIISOIEC1011832003INFORMATIONTECHNOLOGYSECURITYTECHNIQUESHASHFUNCTIONSPART3DEDICATEDHASHFUNCTIONSADOPTEDBYINCITS

链接地址:http://www.mydoc123.com/p-437136.html