|
US$279.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 18238.1-2024: Cybersecurity technology - Hash-functions - Part 1: General Status: Valid GB/T 18238.1: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 18238.1-2024 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Cybersecurity technology - Hash-functions - Part 1: General
| Valid |
GB/T 18238.1-2024
|
| GB/T 18238.1-2000 | English | 249 |
Add to Cart
|
3 days [Need to translate]
|
Information technology. Security techniques. Hash-function. Part 1: General
| |
GB/T 18238.1-2000
|
PDF similar to GB/T 18238.1-2024
Basic data | Standard ID | GB/T 18238.1-2024 (GB/T18238.1-2024) | | Description (Translated English) | Cybersecurity technology - Hash-functions - Part 1: General | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 14,180 | | Date of Issue | 2024-09-29 | | Date of Implementation | 2025-04-01 | | Older Standard (superseded by this standard) | GB/T 18238.1-2000 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 18238.1-2024: Cybersecurity technology - Hash-functions - Part 1: General---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Replaces GB/T 18238.1-2000
Network security technology hash function
Part 1.General
Hash-functions-Part 1.General,MOD)
Released on 2024-09-29
2025-04-01 Implementation
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
Introduction V
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Symbols 2
4.1 General symbols 2
4.2 Coding Conventions 2
5 Requirement 2
6 General Model of Hash Function 3
6.1 Overview 3
6.2 Hash Operation 3
6.2.1 General 3
6.2.2 Step 1 (filling) 3
6.2.3 Step 2 (Segmentation) 3
6.2.4 Step 3 (Iteration) 3
6.2.5 Step 4 (Output Transformation) 3
6.3 Use of the general model 4
Appendix A (Normative) Filling Method 5
Appendix B (Informative) Safety Precautions 6
References 7
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
This document is Part 1 of GB/T 18238 "Network Security Technology Hash Function". GB/T 18238 has published the following
part.
--- Part 1.General;
--- Part 2.Hash functions using block ciphers;
--- Part 3.Specially designed hash functions.
This document replaces GB/T 18238.1-2000 "Information technology security techniques - Hash functions - Part 1.Overview" and
Compared with GB/T 18238.1-2000, in addition to structural adjustments and editorial changes, the main technical changes are as follows.
a) Changed the term "collision-free hash function" to "collision-resistant hash function" (see 3.4, 2.1 of the.2000 edition);
b) Changed the term "hash code" to "hash value" (see 3.3, 2.3 of the.2000 edition);
c) Added terms such as "output transformation" and "round function" (see Chapter 3);
d) Added symbols Bi, Di, Hi, h, L1, L2, n, q, T, ϕ (see Chapter 4);
e) Added “General Model of Hash Functions” (see Chapter 6);
f) Change Filling Method 2 to Filling Method 1, add Filling Method 2; and delete Filling Method 1 (see A.3,.2000 Edition)
Appendix B).
This document is modified to adopt ISO /IEC 10118-1.2016 "Information technology security techniques – Hash functions – Part 1.General principles".
This document has the following structural adjustments compared to ISO /IEC 10118-1.2016.
--- Adjusted the order of the terms "hash function" and "anti-collision hash function" (see Chapter 3);
---4.1 corresponds to 4.1 and 4.2 of ISO /IEC 10118-1.2016;
--- Deleted Appendix B of ISO /IEC 10118-1.2016 and adjusted Appendix C to Appendix B.
The technical differences between this document and ISO /IEC 10118-1.2016 and their reasons are as follows.
---Move the introduction about hash functions in "Scope" to "Introduction";
--- Added normative reference document GB/T 25069-2022 (see Chapter 3);
---Added the symbol n to represent the block length of the block cipher and q to represent the number of blocks of the input data bit string (see Chapter 4);
--- Move the note to 3.4 of ISO /IEC 10118-1.2016 to Chapter 5 and change it to the main text;
--- Deleted the normative Annex B "Principles for adopting hash functions in ISO /IEC 10118 (all parts)" because this principle is
The principles considered by ISO in adopting algorithm proposals from various countries are not directly applicable to the algorithms that specific countries regulate themselves.
The following editorial changes were made to this document.
--- In order to coordinate with my country's technical standard system, the name of the standard is changed to "Network Security Technical Hash Function Part 1.General Principles";
--- Incorporated the contents of ISO /IEC 10118-1.2016/Amd.1.2021;
--- Added the source standard for the terms "collision-resistant hash function", "hash value", "hash function", "initialization value" and "padding" (see Section 3
chapter);
--- Deleted the notes to the terms "hash function", "hash value" and "initialization value", and changed the note to the term "round function" (see Chapter 3);
--- Replaced ISO /IEC 10118 (all parts) with the informative reference GB/T 18238 (all parts),
GB/T 18238.2 and GB/T 18238.3 replace other parts of ISO /IEC 10118;
--- Deleted Example 1 of B.3 in informative Appendix B (see Appendix C of ISO /IEC 10118-2.2016);
--- Deleted the padding method 3 of ISO /IEC 10118-1.2016/Amd.1.2021, because the hash function specified in this series of documents
This fill method is not used.
--- Changed references.
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. China Electronics Technology Network Security Technology Co., Ltd., National Cryptography Administration Commercial Cryptography Testing Center, China Electronics
Electronic Technology Standardization Institute, the 15th Institute of China Electronics Technology Group Corporation, the Institute of Information Engineering of the Chinese Academy of Sciences, the Chinese Academy of Sciences
Software Research Institute, University of Chinese Academy of Sciences, Shandong University, Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., Beijing UnionPay Gold Card Technology
Co., Ltd., Geer Software Co., Ltd., Beijing Xin'an Century Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., Huawei
Technology Co., Ltd., Beijing Jiangnan Tianan Technology Co., Ltd., Zhixun Password (Shanghai) Detection Technology Co., Ltd., Beijing Hitech Fangyuan Technology
Limited by Share Ltd.
The main drafters of this document are. Zhang Liting, Luo Peng, Li Yanfeng, Li Yanjun, Mao Yingying, Li Shimin, Huang Jingjing, Shi Danping, Sui Han, Sun Siwei,
Wang Peng, Wang Wei, Wang Dandan, Du Zhiqiang, Wang Ti, Yang Bo, Zheng Qiang, Gong Xiaoyan, Ma Hongfu, Zeng Guang, Li Xueyan, Han Wei, Pan Wenlun, Jia Shijie,
Xiong Yun, Yang Huihui.
The previous versions of this document and the documents it replaces are as follows.
---First published in.2000 as GB/T 18238.1-2000;
---This is the first revision.
Introduction
A hash function uses a specific algorithm to map a bit string of arbitrary length (usually with an upper limit) to a bit string of fixed length.
Commonly used for.
---Compress the message into a digest for input into the digital signature mechanism;
---Promise a given bit string to the user without revealing the bit string.
Note. The hash functions specified in GB/T 18238 (all parts) do not involve the use of keys. However, these hash functions are used in conjunction with keys to construct messages.
GB/T 15852.2 provides the technology of calculating MAC using hash function.
GB/T 18238 "Network Security Technology Hash Function" consists of three parts.
--- Part 1.General. The purpose is to specify the requirements and general model of hash functions to guide other
part.
--- Part 2.Hash functions for block ciphers. The purpose is to specify hash functions for block ciphers.
--- Part 3.Specially designed hash functions. The purpose is to specify specially designed hash functions.
Network security technology hash function
Part 1.General
1 Scope
This document specifies the requirements and general model for hash functions, describes the four steps of hashing, and gives the use of the general model.
method.
This document contains the definitions, symbols and requirements common to GB/T 18238 (all parts).
2 Normative references
The contents of the following documents constitute essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 25069-2022 Information Security Technical Terminology
3 Terms and definitions
The terms and definitions defined in GB/T 25069-2022 and the following apply to this document.
3.1
Hash-function
A function that maps a bit string of arbitrary length to a bit string of fixed length satisfies the following properties.
---Given an output bit string, it is computationally infeasible to find an input bit string that produces the output bit string;
---Given an input bit string, it is computationally infeasible to find another different input bit string that produces the same output bit string.
[Source. GB/T 25069-2022, 3.505]
3.2
data string
The input bit string to the hash function.
3.3
Hash value
The result of a cryptographic hash operation.
[Source. GB/T 25069-2022, 3.764]
3.4
colision-resistant hash-function
A hash function that satisfies the property that it is computationally infeasible to find any two different inputs that map to the same output.
NOTE. Computational feasibility depends on specific safety requirements and environment.
[Source. GB/T 25069-2022, 3.322, modified]
3.5
Initialization value initialization value
In cryptographic transformation, the starting data used for data transformation is introduced to enhance security or synchronize cryptographic equipment.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 18238.1-2024_English be delivered?Answer: Upon your order, we will start to translate GB/T 18238.1-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 18238.1-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 18238.1-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 18238.1-2024?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18238.1-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|