HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 18238.3-2024 English PDF

US$199.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 18238.3-2024: Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions
Status: Valid

GB/T 18238.3: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 18238.3-2024English199 Add to Cart 3 days [Need to translate] Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions Valid GB/T 18238.3-2024
GB/T 18238.3-2002English1214 Add to Cart 6 days [Need to translate] Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions Valid GB/T 18238.3-2002

PDF similar to GB/T 18238.3-2024


Standard similar to GB/T 18238.3-2024

GB/T 18336.2   GB/T 18336.3   GB/T 18336.1   GB/T 19713   GB/T 37027   GB/T 18238.1   

Basic data

Standard ID GB/T 18238.3-2024 (GB/T18238.3-2024)
Description (Translated English) Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 10,136
Date of Issue 2024-09-29
Date of Implementation 2025-04-01
Older Standard (superseded by this standard) GB/T 18238.3-2002
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 18238.3-2024: Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 18238.3-2002 Network security technology hash function Part 3.Specially designed hash functions Released on 2024-09-29 2025-04-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols 1 5 Requirements 1 6 Model of specially designed hash functions 2 6.1 Use of the general model 2 6.2 Round Function Model 2 7 Hash function SM3 2 7.1 Overview 2 7.2 Parameter Selection 2 7.3 Filling method 2 7.4 Initialization Value 2 7.5 Round Function 2 7.6 Output Transformation 2 Appendix A (Normative) Object Identifier 3 References 4

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document is part 3 of GB/T 18238 "Network Security Technology Hash Function". GB/T 18238 has published the following part. --- Part 1.General; --- Part 2.Hash functions using block ciphers; --- Part 3.Specially designed hash functions. This document replaces GB/T 18238.3-2002 "Information technology security techniques - Hash functions - Part 3.Special hash functions Compared with GB/T 18238.3-2002, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) The terms "block", "hash function identifier", "round robin function", "word" and their definitions (see Chapter 3 of the.2002 edition) are deleted; b) Added the term "byte" (see Chapter 3); c) Deleted Special Hash Function 1, Special Hash Function 2 and Special Hash Function 3 (see Chapter 7, Chapter 8 and Chapter 9); d) Added hash function SM3 (see Chapter 7); e) Changed Appendix A Instance to Appendix A Object Identifier (see Appendix A, Appendix A of the.2002 Edition). Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Network Security Technology Co., Ltd., National Cryptography Administration Commercial Cryptography Testing Center, China Electronics Electronic Technology Standardization Institute, University of Chinese Academy of Sciences, Shandong University, Institute of Software, Chinese Academy of Sciences, Xi'an Xidian Jietong Wireless Network Communications Co., Ltd., Beijing UnionPay Gold Card Technology Co., Ltd., the 15th Research Institute of China Electronics Technology Group Corporation, Geer Software Co., Ltd. Company, Beijing Xin'an Century Technology Co., Ltd., Shandong De'an Information Technology Co., Ltd., Huawei Technologies Co., Ltd., Zhixun Password (Shanghai) Testing Technology Co., Ltd., Beijing Jiangnan Tianan Technology Co., Ltd., and Beijing Hitech Fangyuan Technology Co., Ltd. The main drafters of this document are. Zhang Liting, Luo Peng, Zhao Xinqiang, Li Shimin, Mao Yingying, Huang Jingjing, Sun Siwei, Wang Wei, Sui Han, Li Qin, Yang Bo, Li Yanjun, Lin Yanghuichen, Zheng Qiang, Zhao Lipeng, Gong Xiaoyan, Ma Hongfu, Zeng Guang, Han Wei, Li Xueyan, Pan Wenlun, Xiong Yun, Jia Shijie, Wang Yuewu, Wang Xianfang, Chen Yiyan, and Wang Yuehui. The previous versions of this document and the documents it replaces are as follows. ---First published in.2002 as GB/T 18238.3-2002; ---This is the first revision.

Introduction

A hash function uses a specific algorithm to map a bit string of arbitrary length (usually with an upper limit) to a bit string of fixed length. A hash function refers to a hash function that is directly designed during the design process without relying on other cryptographic primitives (such as block ciphers, etc.). GB/T 18238 "Network Security Technology Hash Function" consists of three parts. --- Part 1.General. The purpose is to specify the requirements and general model of hash functions to guide other part. --- Part 2.Hash functions for block ciphers. The purpose is to specify hash functions for block ciphers. --- Part 3.Specially designed hash functions. The purpose is to specify specially designed hash functions. Network security technology hash function Part 3.Specially designed hash functions

1 Scope

This document specifies the requirements and models for specially designed hash functions. This document applies to the design, development, and testing of specially designed hash functions.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 18238.1-2024 Network security technology hash functions Part 1.General (ISO /IEC 10118-1.2016, MOD) GB/T 25069 Information security technical terms GB/T 32905-2016 Information security technology SM3 cryptographic hash algorithm

3 Terms and definitions

The terms and definitions defined in GB/T 25069 and GB/T 18238.1-2024 and the following apply to this document. 3.1 byte A bit string consisting of 8 consecutive bits.

4 Symbols

The following symbols apply to this document. Bi. the i-th byte of B. D. Data. H. hash value. IV. Initialization value. LX. The length of bit string X in bits. L1.The length of the first bit string in the two bit strings input to the round function φ. L2.The bit length of the second bit string of the two bit strings input to the round function φ, which is also the bit length of the output value of the round function φ, and the initial The bit length of the initialization value IV. r. The bit length of the reserved bit string in the padding method.

5 Requirements

Users of the hash functions in this document should choose.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 18238.3-2024_English be delivered?

Answer: Upon your order, we will start to translate GB/T 18238.3-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 18238.3-2024_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 18238.3-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 18238.3-2024?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18238.3-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.