Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 18238.2-2024 English PDF

US$529.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 18238.2-2024: Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
Status: Valid

GB/T 18238.2: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 18238.2-2024529 Add to Cart 5 days Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher Valid
GB/T 18238.2-2002394 Add to Cart 3 days Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher Valid

Similar standards

GB/T 18336.2   GB/T 18336.3   GB/T 18336.1   GB/T 19713   GB/T 37027   GB/T 18238.1   

Basic data

Standard ID: GB/T 18238.2-2024 (GB/T18238.2-2024)
Description (Translated English): Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.030
Word Count Estimation: 26,232
Date of Issue: 2024-09-29
Date of Implementation: 2025-04-01
Older Standard (superseded by this standard): GB/T 18238.2-2002
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 18238.2-2024: Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 18238.2-2002 Network security technology hash function Part 2.Hash functions using block ciphers techniques-Hash-functions-Part 2.Hash-functionsusingan Published on September 29, 2024, implemented on April 1, 2025 State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III Introduction V 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols 1 5 Use of the general model 2 6 Hash function 1 2 6.1 Overview 2 6.2 Parameter Selection 3 6.3 Filling method 3 6.4 Initialization Value 3 6.5 Round Function 3 6.6 Output Transformation 3 7 Hash function 2 3 7.1 Overview 3 7.2 Parameter Selection 4 7.3 Filling Method 4 7.4 Initialization Value 4 7.5 Round Function 4 7.6 Output Transformation 6 8 Hash function 3 6 8.1 Overview 6 8.2 Parameter selection 7 8.3 Filling method 7 8.4 Initialization Value 7 8.5 Round Function 7 8.6 Output Transformation 9 Appendix A (Informative) Definition of initialization value and transformation u10 Appendix B (Informative) Example 12 References 19

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document is Part 2 of GB/T 18238 "Network Security Technology Hash Function". GB/T 18238 has published the following part. --- Part 1.General; --- Part 2.Hash functions using block ciphers; --- Part 3.Specially designed hash functions. This document replaces GB/T 18238.2-2002 "Information technology security techniques - Hash functions - Part 2.Hash functions using n-bit block ciphers" Compared with GB/T 18238.2-2002, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) Added the term "group" (see 3.1); b) Added an overview of hash functions (see 6.1); c) Change hash function 3 to hash function 2, change hash function 4 to hash function 3, and delete hash function 2 (see Chapter 7, 8 of the.2002 edition, and Chapters 7, 8, and 9 of the.2002 edition). This document is modified to adopt ISO /IEC 10118-2.2010 "Information technology security techniques - Hash functions - Part 2.Using n-bit Hash Functions for Block Ciphers. This document has the following structural adjustments compared to ISO /IEC 10118-2.2010. --- Chapter 7 corresponds to Chapter 8 of ISO /IEC 10118-2.2010; --- Chapter 8 corresponds to Chapter 9 of ISO /IEC 10118-2.2010. The technical differences between this document and ISO /IEC 10118-2.2010 and their reasons are as follows. --- Added normative reference document GB/T 25069-2022 (see Chapter 3); --- Changed the term "n-bit block cipher" to "block cipher" and deleted the term "round function" (see Chapter 3); --- Added D, Di, H, Hi, IV, L1, L2, LX, n, q, T, X‖Y, X ⊕Y,.=, ϕ, and improved the symbol definitions (see Chapter 4); --- Deleted the hash function 2 specified in ISO /IEC 10118-2.2010, because the hash function has been found to have security issues; and Change the hash functions 3 and 4 specified in ISO /IEC 10118-2.2010 to hash functions 2 of this document. (see Chapter 7) and hash function 3 (see Chapter 8), and optimized description logic (see Chapters 7 and 8); --- Deleted the normative Appendix C because the code given in this appendix is not applicable to my country. The following editorial changes were made to this document. --- In order to coordinate with my country's technical standard system, the name of the standard was changed to "Network Security Technology Hash Function Part 2.Using Segmentation Hash functions for group ciphers"; --- Incorporated ISO /IEC 10118-2.2010/Cor1.2011; --- Added the note for the term "group" (see 3.1); --- Added notes on the security of hash functions (see 7.1, 8.1); --- Corrected the typo in ISO /IEC Chapter 9 Round Function, changing "For the specific definition of β related to the hash function, see 8.1" to “The specific definition of β associated with this hash function is given in 7.5” (see Chapter 9); --- Changed the informative Appendix A, replaced the AES block cipher algorithm with the SM4 block cipher algorithm to guide the SM4 algorithm In Table A.1, "sub-function i" is changed to "the first 3 bits of the key", and in Table A.2, "sub-function i" is changed to "the first 3 bits of the key". The first 4 digits” (see Appendix A); --- Changed the informative Appendix B, and gave examples of three hash functions using the SM4 block cipher algorithm (see Appendix B); --- Added the informative reference document GB/T 32907-2016 (see Appendix B); --- Adjusted some statements (see 7.5, 8.5), changed some data to table format for easier reading, and added table numbers (see Appendix Record B); ---Adjusted references. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Network Security Technology Co., Ltd., National Cryptography Administration Commercial Cryptography Testing Center, China Electronics Electronic Technology Standardization Institute, Institute of Software, Chinese Academy of Sciences, 15th Institute of China Electronics Technology Group Corporation, Shandong University, Xi'an Dianjietong Wireless Network Communications Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing UnionPay Gold Card Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., Huawei Technologies Co., Ltd., Geer Software Co., Ltd., Zhixun Password (Shanghai) Inspection Co., Ltd. Beijing Xinan Century Technology Co., Ltd., Beijing Hitech Fangyuan Technology Co., Ltd. LIMITED. The main drafters of this document are. Zhang Liting, Luo Peng, Li Yanfeng, Sui Han, Mao Yingying, Li Yanjun, Li Shimin, Wang Wei, Huang Jingjing, Zhang Guoqiang, Shi Danping, Wang Peng, Sun Siwei, Sun Xiaofeng, Yang Bo, Tan Yifu, Wang Bingzheng, Ma Hongfu, Zeng Guang, Zheng Qiang, Han Wei, Li Xueyan, Gong Xiaoyan, Pan Wenlun, Jia S., Xiong Y., Zhang X., Liu G., and Wei M. The previous versions of this document and the documents it replaces are as follows. ---First published in.2002 as GB/T 18238.2-2002; ---This is the first revision.

Introduction

The hash function uses a specific algorithm to map a bit string of arbitrary length (usually with an upper limit) to a bit string of fixed length. The hash function of the code refers to. in the design process, the block cipher algorithm (such as SM4, etc.) is used as the main component, and a certain iterative mechanism is used to form The hash function of. GB/T 18238 "Network Security Technology Hash Function" consists of three parts. --- Part 1.General. The purpose is to specify the requirements and general model of hash functions to guide other part. --- Part 2.Hash functions for block ciphers. The purpose is to specify hash functions for block ciphers. --- Part 3.Specially designed hash functions. The purpose is to specify specially designed hash functions. Network security technology hash function Part 2.Hash functions using block ciphers

1 Scope

This document specifies three hash functions for use with (n-bit) block ciphers. The first hash function provides a hash of length no greater than n bits. The first hash function provides a 2n-bit hash value, the second hash function provides a 2n-bit hash value, and the third hash function provides a 3n-bit hash value. This document applies to the design, development, and testing of hash functions employed in block ciphers.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 18238.1-2024 Network security technology hash functions Part 1.General (ISO /IEC 10118-1.2016, MOD) Note. There is no technical difference between the referenced content of GB/T 18238.1-2024 and the referenced content of ISO /IEC 10118-1.2000. GB/T 25069-2022 Information Security Technical Terminology

3 Terms and definitions

The terms and definitions defined in GB/T 25069-2022 and GB/T 18238.1-2024 and the following apply to this document. 3.1 Grouping blocks A sequence of elements recorded or transmitted as a unit. Note. Here, elements are characters, words or records. [Source. GB/T 25069-2022, 3.354] 3.2 Block cipher A cryptographic algorithm is a symmetric encryption system that operates on blocks of plaintext (i.e., strings of bits of a defined length) to produce blocks of ciphertext. [Source. GB/T 25069-2022, 3.161]

4 Symbols

The following symbols apply to this document. BL. When n is an even number, the leftmost n/2 bits of the n-bit string B; when n is an odd number, the leftmost n 1()/2 bits of the n-bit string B Bit string. BR. When n is an even number, the rightmost n/2 bits of the n-bit string B; when n is an odd number, the rightmost n-1()/2 bits of the n-bit string B Bit string. Bi. When B is a sequence of multiple m-bit words, Bi(i≥0) represents the i-th m-bit word of B. In particular, when m=8
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 18238.2-2024_English be delivered?

Answer: Upon your order, we will start to translate GB/T 18238.2-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 18238.2-2024_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 18238.2-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 18238.2-2024?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18238.2-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.