ISO/IEC 10118-1:1994
(Main)Information technology — Security techniques — Hash-functions — Part 1: General
Information technology — Security techniques — Hash-functions — Part 1: General
Technologies de l'information — Techniques de sécurité — Fonctions de brouillage — Partie 1: Généralités
General Information
Relations
Standards Content (Sample)
INTERNATIONAL
ISO/IEC
STANDARD
10118-1
First edition
1994-1 O-l 5
Information technology - Security
Hash-functions -
techniques -
Part 1:
General
Technologies de I ’information - Techniques de skurit6 - Fonctions de
bro uillage -
Partie 7: G&&alit&
Reference number
ISO/IEC 10118-1 :1994(E)
---------------------- Page: 1 ----------------------
ISOhEC 10118-1 :1994(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the Inter-
national Electrotechnical Commission) form the specialized System for
worldwide standardization. National bodies that are members of ISO or
IEC participate in the development of International Standards through
technical committees established by the respective organization to deal
with particular fields of technical activity. ISO and IEC technical com-
mittees collaborate in fields of mutual interest. Other international organ-
izations, governmental and non-governmental, in liaison with ISO and IEC,
also take part in the work.
In the field of information technology, ISO and IEC have established a joint
technical committee, lSO/IEC JTC 1. Draft International Standards adopted
by the joint technical committee are circulated to national bodies for vot-
ing. Publication as an International Standard requires approval by at least
75 % of the national bodies casting a vote.
International Standard lSO/lEC 10118-1 was prepared by Joint Technical
Committee lSO/IEC JTC 1, Information technology, Subcommittee SC 27,
IT Security techniques.
ISO/IEC 10118 consists of the following Parts, under the general title In-
forma tion technology - Security techniques - Hash-functions:
- Part 7: General
- Part 2: Hash-functions using an n-bit block tipher algorithm
Annexes A, B and C of this patt of lSO/IEC 10118 are for information only.
0 ISO/IEC 1994
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced
or utilized in any form or by any means, electronie or mechanical, including photocopying and
microfilm, without Permission in writing from the publisher.
l Gase Postale 56 l CH-l 211 Geneve 20 l Switzerland
I SO/I EC Copyright Office
Printed in Switzerland
---------------------- Page: 2 ----------------------
ISO/IEC 10118-1 : 1994 (E)
0 ISO/IEC
Introduction
Hash-functions map arbitrary strings of bits to a given range. They tan be used for
- reducing a message to a short imprint for input to a digital signature mechanism;
- committing the user to a given string of bits without revealing this string.
The purpose of ISO/IEC 10118 is toprovide avariety of hash-functions which are suitable
forsecuritytechniques. Hash-functions maybeusedforotherpurposesoutsidethescope
of this International Standard, such as simulating a random number generator.
---------------------- Page: 3 ----------------------
This page intentionally left blank
---------------------- Page: 4 ----------------------
INTERNATIONAL STANDARD o ’So/IEC lSO/lEC 10118-1 : 1994 (E)
Information technology - Security techniques - Hash-functions
Part 1 : General
- it is computationally infeasible tofindfor a given output an
1 Scope
input which maps to this output;
- it is computationally infeasible to find for a given input a
ISO/IEC 10118 specifies hash-functions and is therefore
second input which maps to the same output.
applicable to the Provision of authentication, integrity and
non-repudiation Services.
NOTES
NOTE - In contrast to thecalculation of a Message Authenti-
1 - The Iiterature of the subject contains a variety of terms
cation Code (MAC), the goal of which is to ensure authen-
which have the Same or similar meaning as hash-function.
tication of a message employing a secret key, the genera-
Compressed encoding and condensing function are some
tion of a hash-code does not involve a secret key. For the
examples.
calculation of the MAC the user is referred to ISO/IEC 9797
.
[ll
2 - Computational feasibility depends on the user ’s specific
security requirements and environment.
This patt of ISO/IEC 10118 contains definitions, Symbols,
abbreviations and requirements which are common to all
2.5 initializing value: A value used in defining the
the other Parts of ISO/IEC 10118.
starting Point of a hash-function.
2.6 padding: Appending extra bits to a data string.
2 Definitions
Forthe purposes of ISO/IEC 10118, thefollowing definitions
3 Symbols and notation
aPPlY l
Throughout lSO/IEC 10118, the following Symbols and
2.1 collision-resistant hash-f unction: A hash-function
abbrevations are used :
satisfying the following property.
D Data
- it is computationally infeasible to find any two distinct
inputs which map to the same ouput.
H Hash-code
NOTE - Computational feasibility depends on the user ’s
IV Initializing value
specific security requirement
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.