Information technology — Security techniques — Hash-functions — Part 1: General

Technologies de l'information — Techniques de sécurité — Fonctions de brouillage — Partie 1: Généralités

General Information

Status
Withdrawn
Publication Date
07-Jun-2000
Withdrawal Date
07-Jun-2000
Current Stage
9599 - Withdrawal of International Standard
Completion Date
14-Oct-2016
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 10118-1:2000 - Information technology -- Security techniques -- Hash-functions
English language
7 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 10118-1
Second edition
2000-06-15
Information technology — Security
techniques — Hash-functions —
Part 1:
General
Technologies de l’information — Techniques de sécurité — Fonctions
de brouillage —
Partie 1: Généralités
Reference number
ISO/IEC 10118-1:2000(E)
©
ISO/IEC 2000

---------------------- Page: 1 ----------------------
ISO/IEC 10118-1:2000(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not
be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this
file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this
area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event
that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO 2000
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic
or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body
in the country of the requester.
ISO copyright office
Case postale 56 � CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 734 10 79
E-mail copyright@iso.ch
Web www.iso.ch
Printed in Switzerland
ii © ISO/IEC 2000 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 10118-1:2000(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission)
form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC
participate in the development of International Standards through technical committees established by the
respective organization to deal with particular fields of technical activity. ISO and IEC technical committees
collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in
liaison with ISO and IEC, also take part in the work.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3.
In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this part of ISO/IEC 10118 may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
International Standard ISO/IEC 10118-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information
technology, Subcommittee SC 27, IT Security techniques.
This second edition cancels and replaces the first edition (ISO/IEC 10118-1:1994), which has been technically
revised to add a general model for hash-functions. Note, however, that implementations which comply with
ISO/IEC 10118-1:1994 will be compliant with this edition of ISO/IEC 10118-1.
ISO/IEC 10118 consists of the following parts, under the general title Information technology — Security
techniques — Hash-functions:
� Part 1: General
� Part 2: Hash-functions using an n-bit block cipher algorithm
� Part 3: Dedicated hash-functions
� Part 4: Hash-functions using modular arithmetic
Annex A forms a normative part of this part of ISO/IEC 10118.
© ISO/IEC 2000 – All rights reserved iii

---------------------- Page: 3 ----------------------
INTERNATIONAL STANDARD ISO/IEC 10118-1:2000(E)
Information technology — Security techniques — Hash-functions —
Part 1:
General
1 Scope
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and
non-repudiation services. Hash-functions map arbitrary strings of bits to a fixed-length strings of bits, using a
specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string.
NOTE - The hash-functions specified in this part of ISO/IEC 10118 do not involve the use of secret keys. However,
these hash-functions may be used, in conjunction with secret keys, to build message authentication codes.
Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. For the
calculation of a MAC the user is referred to ISO/IEC 9797.
This part of ISO/IEC 10118 contains definitions, symbols, abbreviations and requirements, that are common to all
the other parts of ISO/IEC 10118.
2 Normative references
The following normative documents contain provisions which, through reference in this text, constitute provisions of
this part of ISO/IEC 10118. For dated references, subsequent amendments to, or revisions of, any of these
publications do not apply. However, parties to agreements based on this part of ISO/IEC 10118 are encouraged to
investigate the possibility of applying the most recent editions of the normative documents indicated below. For
undated references, the latest edition of the normative document referred to applies. Members of ISO and IEC
maintain registers of currently valid International Standards.
ISO/IEC 9797 (all parts), Information technology – Security techniques – Message Authentication Codes (MACs).
3 Terms and definitions
For the purposes of this part of ISO/IEC 10118, the following terms and definitions apply.
3.1
big-endian
a method of storage of multi-byte numbers with the most significant bytes at the lowest memory addresses
3.2
collision-resistant hash-function
a hash-function satisfying the following property: it is computationally infeasible to find any two distinct inputs which
map to the same output
NOTE – computational feasibility depends on the specific security requirements and environment.
3.3
data string (data)
a string of bits which is the input to a hash-function
© ISO/IEC 2000 – All rights reserved 1

---------------------- Page: 4 ----------------------
ISO/IEC 10118-1:2000(E)
3.4
hash-code
the string of bits which is the output of a hash-function
NOTE – The literature on this subject contains a variety of terms that have the same or similar meaning as hash-code.
Modification Detection Code, Manipulation Detection Code, digest, hash-result, hash-value and imprint are some examples.
3.5
hash-function
a function which maps strings of bits to fixed-length strings of bits, satisfying the following two properties:
- it is computationally infeasible to find for a given output, an input which maps to this output;
- it is computationally infeasible to find for a given input, a second input which maps to the same output
NOTE – Computational feasibility depends on the specific security requirements and environment.
3.6
hash-function identifier
a byte identifying a specific hash-function
3.7
initializing value
a value used in defining the starting point of a hash-function
3.8
output transformation
a transformation or mapping of the output of the iteration stage to obtain the hash-code
3.9
padding
appending extra bits to a data string
3.10
round-function
a function f (.,.) that transforms two binary strings of lengths L and L to a binary string of length L - it is used
1 2 2
iteratively as part of a hash-function, where it combines a data string of length L with the previous output of length
1
L
2
4 Symbols (and abbreviated terms)
4.1 General Symbols
Throughout ISO/IEC 1
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.