CAN CSA-ISO IEC 10118-3A-2007 Information technology - Security techniques - Hash-functions - Part 3 Dedicated hash-functions AMENDMENT 1 Dedicated Hash-Function 8 (SHA-224).pdf
《CAN CSA-ISO IEC 10118-3A-2007 Information technology - Security techniques - Hash-functions - Part 3 Dedicated hash-functions AMENDMENT 1 Dedicated Hash-Function 8 (SHA-224).pdf》由会员分享,可在线阅读,更多相关《CAN CSA-ISO IEC 10118-3A-2007 Information technology - Security techniques - Hash-functions - Part 3 Dedicated hash-functions AMENDMENT 1 Dedicated Hash-Function 8 (SHA-224).pdf(16页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberISO/IEC 10118-3:2004/Amd.1:2006(E)ISO/IEC 2006Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions AMENDMENT 1: Dedicated Hash-Function 8 (SHA-224) Technologies de linformation Techniques de scurit Fonctions de brouillage Partie 3: Fonctions de
2、brouillage ddies AMENDEMENT 1: Fonction de brouillage ddie 8 (SHA-224) Amendment 1:2007 toNational Standard of CanadaCAN/CSA-ISO/IEC 10118-3:04Amendment 1:2006 to International Standard ISO/IEC 10118-3:2004 has been adopted withoutmodification (IDT) as Amendment 1:2007 to CAN/CSA-ISO/IEC 10118-3:04.
3、 This Amendment was reviewedby the CSA Technical Committee on Information Technology (TCIT) under the jurisdiction of the StrategicSteering Committee on Information Technology and deemed acceptable for use in Canada.August 2007 International Organization for Standardization (ISO), 2006. All rights r
4、eserved. International Electrotechnical Commission (IEC), 2006. All rights reserved. NOT FOR RESALE. ISO/IEC 10118-3:2004/Amd.1:2006(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited
5、unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trade
6、mark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies
7、. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 2006 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechani
8、cal, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.o
9、rgii ISO/IEC 2006 All rights reservedAmendment 1:2007 toCAN/CSA-ISO/IEC 10118-3:04ISO/IEC 10118-3:2004/Amd.1:2006(E) ISO/IEC 2006 All rights reserved iiiForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized syst
10、em for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees co
11、llaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standa
12、rds are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication
13、 as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such pate
14、nt rights. Amendment 1 to ISO/IEC 10118-3:2004 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. Amendment 1 to ISO/IEC 10118-3:2004 was written to serve two purposes. First, with the inclusion of Dedicated Hash-Function 8 (S
15、HA-224), ISO/IEC 10118-3:2004 now includes the complete family of SHA hash-functions. The description of SHA-224 is given in Clause 14. Test vectors for SHA-224 are given in A.8. Second, it was noted that there were implementations of SHA-384 and SHA-512 in the field which correctly reproduced the t
16、est vector examples in ISO/IEC 10118-3:2004, yet still failed for inputs containing bytes that were not standard ASCII codes. In order to perform comprehensive testing of the SHA-224, SHA-256, SHA-384 and SHA-512 hash-functions, an extended set of test vectors is included for ISO/IEC 10118-3:2004 as
17、 a part of this amendment. This additional test vector information is given in A.9. Amendment 1:2007 toCAN/CSA-ISO/IEC 10118-3:04Blank pageISO/IEC 10118-3:2004/Amd.1:2006(E) ISO/IEC 2006 All rights reserved 1Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions A
18、MENDMENT 1: Dedicated Hash-Function 8 (SHA-224) Page 22 Add the following after Figure 6. 14 Dedicated Hash-Function 8 (SHA-224) In this clause we specify a padding method, an initialising value, and a round-function for use in the general model for hash-functions described in ISO/IEC 10118-1:2000.
19、The padding method, initialising value and round-function specified here, when used in the above general model, together define Dedicated Hash-Function 8. This dedicated hash-function can be applied to all data strings D containing at most 264-1 bits. The ISO/IEC hash-function identifier for Dedicat
20、ed Hash-Function 8 is equal to 38 (hexadecimal). NOTE Dedicated Hash-Function 8 defined in this clause is commonly called SHA-224, 2. 14.1 Parameters, functions and constants 14.1.1 Parameters For this hash-function L1= 512, L2= 256 and LH = 224. 14.1.2 Byte ordering convention The byte ordering con
21、vention for this hash-function is the same as that for the hash-function of clause 10. 14.1.3 Functions The functions for this hash-function are the same as those for the hash-function of clause 10. 14.1.4 Constants The constants for this hash-function are the same as those for the hash-function of
22、clause 10. Amendment 1:2007 toCAN/CSA-ISO/IEC 10118-3:04ISO/IEC 10118-3:2004/Amd.1:2006(E) 2 ISO/IEC 2006 All rights reserved14.1.5 Initialising value For this round-function the initialising value, IV, shall always be the following 256-bit string, represented here as a sequence of eight words Y0, Y
23、1, Y2, Y3, Y4, Y5, Y6, Y7in a hexadecimal representation, where Y0represents the left-most 32 of the 256 bits: Y0= c1059ed8 Y1= 367cd507 Y2= 3070dd17 Y3= f70e5939 Y4 = ffc00b31 Y5 = 68581511 Y6 = 64f98fa7 Y7= befa4fa4 NOTE These values are the low order 32-bits of the values specified in 12.1.5. 14.
24、2 Padding method The padding method to be used with this hash-function shall be the same as the padding method defined in 10.2. 14.3 Description of the round-function The round-function to be used with this hash-function shall be the same as the round-function defined in 10.3. The final 224-bit hash
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CANCSAISOIEC101183A2007INFORMATIONTECHNOLOGYSECURITYTECHNIQUESHASHFUNCTIONSPART3DEDICATEDHASHFUNCTIONSAMENDMENT1DEDICATEDHASHFUNCTION8SHA224PDF

链接地址:http://www.mydoc123.com/p-590158.html