GB/T 18238.1-2024 English PDFUS$279.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 18238.1-2024: Cybersecurity technology - Hash-functions - Part 1: General Status: Valid GB/T 18238.1: Historical versions
Basic dataStandard ID: GB/T 18238.1-2024 (GB/T18238.1-2024)Description (Translated English): Cybersecurity technology - Hash-functions - Part 1: General Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 14,180 Date of Issue: 2024-09-29 Date of Implementation: 2025-04-01 Older Standard (superseded by this standard): GB/T 18238.1-2000 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 18238.1-2024: Cybersecurity technology - Hash-functions - Part 1: General---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 18238.1-2000 Network security technology hash function Part 1.General Hash-functions-Part 1.General,MOD) Released on 2024-09-29 2025-04-01 Implementation State Administration for Market Regulation The National Standardization Administration issued Table of ContentsPreface III Introduction V 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols 2 4.1 General symbols 2 4.2 Coding Conventions 2 5 Requirement 2 6 General Model of Hash Function 3 6.1 Overview 3 6.2 Hash Operation 3 6.2.1 General 3 6.2.2 Step 1 (filling) 3 6.2.3 Step 2 (Segmentation) 3 6.2.4 Step 3 (Iteration) 3 6.2.5 Step 4 (Output Transformation) 3 6.3 Use of the general model 4 Appendix A (Normative) Filling Method 5 Appendix B (Informative) Safety Precautions 6 References 7ForewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document is Part 1 of GB/T 18238 "Network Security Technology Hash Function". GB/T 18238 has published the following part. --- Part 1.General; --- Part 2.Hash functions using block ciphers; --- Part 3.Specially designed hash functions. This document replaces GB/T 18238.1-2000 "Information technology security techniques - Hash functions - Part 1.Overview" and Compared with GB/T 18238.1-2000, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) Changed the term "collision-free hash function" to "collision-resistant hash function" (see 3.4, 2.1 of the.2000 edition); b) Changed the term "hash code" to "hash value" (see 3.3, 2.3 of the.2000 edition); c) Added terms such as "output transformation" and "round function" (see Chapter 3); d) Added symbols Bi, Di, Hi, h, L1, L2, n, q, T, ϕ (see Chapter 4); e) Added “General Model of Hash Functions” (see Chapter 6); f) Change Filling Method 2 to Filling Method 1, add Filling Method 2; and delete Filling Method 1 (see A.3,.2000 Edition) Appendix B). This document is modified to adopt ISO /IEC 10118-1.2016 "Information technology security techniques – Hash functions – Part 1.General principles". This document has the following structural adjustments compared to ISO /IEC 10118-1.2016. --- Adjusted the order of the terms "hash function" and "anti-collision hash function" (see Chapter 3); ---4.1 corresponds to 4.1 and 4.2 of ISO /IEC 10118-1.2016; --- Deleted Appendix B of ISO /IEC 10118-1.2016 and adjusted Appendix C to Appendix B. The technical differences between this document and ISO /IEC 10118-1.2016 and their reasons are as follows. ---Move the introduction about hash functions in "Scope" to "Introduction"; --- Added normative reference document GB/T 25069-2022 (see Chapter 3); ---Added the symbol n to represent the block length of the block cipher and q to represent the number of blocks of the input data bit string (see Chapter 4); --- Move the note to 3.4 of ISO /IEC 10118-1.2016 to Chapter 5 and change it to the main text; --- Deleted the normative Annex B "Principles for adopting hash functions in ISO /IEC 10118 (all parts)" because this principle is The principles considered by ISO in adopting algorithm proposals from various countries are not directly applicable to the algorithms that specific countries regulate themselves. The following editorial changes were made to this document. --- In order to coordinate with my country's technical standard system, the name of the standard is changed to "Network Security Technical Hash Function Part 1.General Principles"; --- Incorporated the contents of ISO /IEC 10118-1.2016/Amd.1.2021; --- Added the source standard for the terms "collision-resistant hash function", "hash value", "hash function", "initialization value" and "padding" (see Section 3 chapter); --- Deleted the notes to the terms "hash function", "hash value" and "initialization value", and changed the note to the term "round function" (see Chapter 3); --- Replaced ISO /IEC 10118 (all parts) with the informative reference GB/T 18238 (all parts), GB/T 18238.2 and GB/T 18238.3 replace other parts of ISO /IEC 10118; --- Deleted Example 1 of B.3 in informative Appendix B (see Appendix C of ISO /IEC 10118-2.2016); --- Deleted the padding method 3 of ISO /IEC 10118-1.2016/Amd.1.2021, because the hash function specified in this series of documents This fill method is not used. --- Changed references. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Network Security Technology Co., Ltd., National Cryptography Administration Commercial Cryptography Testing Center, China Electronics Electronic Technology Standardization Institute, the 15th Institute of China Electronics Technology Group Corporation, the Institute of Information Engineering of the Chinese Academy of Sciences, the Chinese Academy of Sciences Software Research Institute, University of Chinese Academy of Sciences, Shandong University, Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., Beijing UnionPay Gold Card Technology Co., Ltd., Geer Software Co., Ltd., Beijing Xin'an Century Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., Huawei Technology Co., Ltd., Beijing Jiangnan Tianan Technology Co., Ltd., Zhixun Password (Shanghai) Detection Technology Co., Ltd., Beijing Hitech Fangyuan Technology Limited by Share Ltd. The main drafters of this document are. Zhang Liting, Luo Peng, Li Yanfeng, Li Yanjun, Mao Yingying, Li Shimin, Huang Jingjing, Shi Danping, Sui Han, Sun Siwei, Wang Peng, Wang Wei, Wang Dandan, Du Zhiqiang, Wang Ti, Yang Bo, Zheng Qiang, Gong Xiaoyan, Ma Hongfu, Zeng Guang, Li Xueyan, Han Wei, Pan Wenlun, Jia Shijie, Xiong Yun, Yang Huihui. The previous versions of this document and the documents it replaces are as follows. ---First published in.2000 as GB/T 18238.1-2000; ---This is the first revision.IntroductionA hash function uses a specific algorithm to map a bit string of arbitrary length (usually with an upper limit) to a bit string of fixed length. Commonly used for. ---Compress the message into a digest for input into the digital signature mechanism; ---Promise a given bit string to the user without revealing the bit string. Note. The hash functions specified in GB/T 18238 (all parts) do not involve the use of keys. However, these hash functions are used in conjunction with keys to construct messages. GB/T 15852.2 provides the technology of calculating MAC using hash function. GB/T 18238 "Network Security Technology Hash Function" consists of three parts. --- Part 1.General. The purpose is to specify the requirements and general model of hash functions to guide other part. --- Part 2.Hash functions for block ciphers. The purpose is to specify hash functions for block ciphers. --- Part 3.Specially designed hash functions. The purpose is to specify specially designed hash functions. Network security technology hash function Part 1.General1 ScopeThis document specifies the requirements and general model for hash functions, describes the four steps of hashing, and gives the use of the general model. method. This document contains the definitions, symbols and requirements common to GB/T 18238 (all parts).2 Normative referencesThe contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 25069-2022 Information Security Technical Terminology3 Terms and definitionsThe terms and definitions defined in GB/T 25069-2022 and the following apply to this document. 3.1 Hash-function A function that maps a bit string of arbitrary length to a bit string of fixed length satisfies the following properties. ---Given an output bit string, it is computationally infeasible to find an input bit string that produces the output bit string; ---Given an input bit string, it is computationally infeasible to find another different input bit string that produces the same output bit string. [Source. GB/T 25069-2022, 3.505] 3.2 data string The input bit string to the hash function. 3.3 Hash value The result of a cryptographic hash operation. [Source. GB/T 25069-2022, 3.764] 3.4 colision-resistant hash-function A hash function that satisfies the property that it is computationally infeasible to find any two different inputs that map to the same output. NOTE. Computational feasibility depends on specific safety requirements and environment. [Source. GB/T 25069-2022, 3.322, modified] 3.5 Initialization value initialization value In cryptographic transformation, the starting data used for data transformation is introduced to enhance security or synchronize cryptographic equipment. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 18238.1-2024_English be delivered?Answer: Upon your order, we will start to translate GB/T 18238.1-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 18238.1-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 18238.1-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.Question 5: Should I purchase the latest version GB/T 18238.1-2024?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18238.1-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically. |