Path:
Home >
GB/T >
Page206 > GB/T 18238.2-2024
Price & Delivery
US$529.00 · In stock · Download in 9 secondsGB/T 18238.2-2024: Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
GB/T 18238.2: Historical versions
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 18238.2-2024 | English | 529 |
Add to Cart
|
5 days [Need to translate]
|
Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
|
| GB/T 18238.2-2002 | English | 394 |
Add to Cart
|
3 days [Need to translate]
|
Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 18238.2-2024 (GB/T18238.2-2024) |
| Description (Translated English) | Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.030 |
| Word Count Estimation | 26,280 |
| Date of Issue | 2024-09-29 |
| Date of Implementation | 2025-04-01 |
| Older Standard (superseded by this standard) | GB/T 18238.2-2002 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 18238.2-2024: Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Replaces GB/T 18238.2-2002
Network security technology hash function
Part 2.Hash functions using block ciphers
techniques-Hash-functions-Part 2.Hash-functionsusingan
Published on September 29, 2024, implemented on April 1, 2025
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
Introduction V
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Symbols 1
5 Use of the general model 2
6 Hash function 1 2
6.1 Overview 2
6.2 Parameter Selection 3
6.3 Filling method 3
6.4 Initialization Value 3
6.5 Round Function 3
6.6 Output Transformation 3
7 Hash function 2 3
7.1 Overview 3
7.2 Parameter Selection 4
7.3 Filling Method 4
7.4 Initialization Value 4
7.5 Round Function 4
7.6 Output Transformation 6
8 Hash function 3 6
8.1 Overview 6
8.2 Parameter selection 7
8.3 Filling method 7
8.4 Initialization Value 7
8.5 Round Function 7
8.6 Output Transformation 9
Appendix A (Informative) Definition of initialization value and transformation u10
Appendix B (Informative) Example 12
References 19
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
This document is Part 2 of GB/T 18238 "Network Security Technology Hash Function". GB/T 18238 has published the following
part.
--- Part 1.General;
--- Part 2.Hash functions using block ciphers;
--- Part 3.Specially designed hash functions.
This document replaces GB/T 18238.2-2002 "Information technology security techniques - Hash functions - Part 2.Hash functions using n-bit block ciphers"
Compared with GB/T 18238.2-2002, in addition to structural adjustments and editorial changes, the main technical changes are as follows.
a) Added the term "group" (see 3.1);
b) Added an overview of hash functions (see 6.1);
c) Change hash function 3 to hash function 2, change hash function 4 to hash function 3, and delete hash function 2 (see Chapter 7,
8 of the.2002 edition, and Chapters 7, 8, and 9 of the.2002 edition).
This document is modified to adopt ISO /IEC 10118-2.2010 "Information technology security techniques - Hash functions - Part 2.Using n-bit
Hash Functions for Block Ciphers.
This document has the following structural adjustments compared to ISO /IEC 10118-2.2010.
--- Chapter 7 corresponds to Chapter 8 of ISO /IEC 10118-2.2010;
--- Chapter 8 corresponds to Chapter 9 of ISO /IEC 10118-2.2010.
The technical differences between this document and ISO /IEC 10118-2.2010 and their reasons are as follows.
--- Added normative reference document GB/T 25069-2022 (see Chapter 3);
--- Changed the term "n-bit block cipher" to "block cipher" and deleted the term "round function" (see Chapter 3);
--- Added D, Di, H, Hi, IV, L1, L2, LX, n, q, T, X‖Y, X ⊕Y,.=, ϕ, and improved the symbol definitions (see
Chapter 4);
--- Deleted the hash function 2 specified in ISO /IEC 10118-2.2010, because the hash function has been found to have security issues; and
Change the hash functions 3 and 4 specified in ISO /IEC 10118-2.2010 to hash functions 2 of this document.
(see Chapter 7) and hash function 3 (see Chapter 8), and optimized description logic (see Chapters 7 and 8);
--- Deleted the normative Appendix C because the code given in this appendix is not applicable to my country.
The following editorial changes were made to this document.
--- In order to coordinate with my country's technical standard system, the name of the standard was changed to "Network Security Technology Hash Function Part 2.Using Segmentation
Hash functions for group ciphers";
--- Incorporated ISO /IEC 10118-2.2010/Cor1.2011;
--- Added the note for the term "group" (see 3.1);
--- Added notes on the security of hash functions (see 7.1, 8.1);
--- Corrected the typo in ISO /IEC Chapter 9 Round Function, changing "For the specific definition of β related to the hash function, see 8.1" to
“The specific definition of β associated with this hash function is given in 7.5” (see Chapter 9);
--- Changed the informative Appendix A, replaced the AES block cipher algorithm with the SM4 block cipher algorithm to guide the SM4 algorithm
In Table A.1, "sub-function i" is changed to "the first 3 bits of the key", and in Table A.2, "sub-function i" is changed to "the first 3 bits of the key".
The first 4 digits” (see Appendix A);
--- Changed the informative Appendix B, and gave examples of three hash functions using the SM4 block cipher algorithm (see Appendix B);
--- Added the informative reference document GB/T 32907-2016 (see Appendix B);
--- Adjusted some statements (see 7.5, 8.5), changed some data to table format for easier reading, and added table numbers (see Appendix
Record B);
---Adjusted references.
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. China Electronics Technology Network Security Technology Co., Ltd., National Cryptography Administration Commercial Cryptography Testing Center, China Electronics
Electronic Technology Standardization Institute, Institute of Software, Chinese Academy of Sciences, 15th Institute of China Electronics Technology Group Corporation, Shandong University, Xi'an
Dianjietong Wireless Network Communications Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing UnionPay Gold Card Technology
Co., Ltd., Shandong De'an Information Technology Co., Ltd., Huawei Technologies Co., Ltd., Geer Software Co., Ltd., Zhixun Password (Shanghai) Inspection Co., Ltd.
Beijing Xinan Century Technology Co., Ltd., Beijing Hitech Fangyuan Technology Co., Ltd.
LIMITED.
The main drafters of this document are. Zhang Liting, Luo Peng, Li Yanfeng, Sui Han, Mao Yingying, Li Yanjun, Li Shimin, Wang Wei, Huang Jingjing, Zhang Guoqiang,
Shi Danping, Wang Peng, Sun Siwei, Sun Xiaofeng, Yang Bo, Tan Yifu, Wang Bingzheng, Ma Hongfu, Zeng Guang, Zheng Qiang, Han Wei, Li Xueyan, Gong Xiaoyan, Pan Wenlun,
Jia S., Xiong Y., Zhang X., Liu G., and Wei M.
The previous versions of this document and the documents it replaces are as follows.
---First published in.2002 as GB/T 18238.2-2002;
---This is the first revision.
Introduction
The hash function uses a specific algorithm to map a bit string of arbitrary length (usually with an upper limit) to a bit string of fixed length.
The hash function of the code refers to. in the design process, the block cipher algorithm (such as SM4, etc.) is used as the main component, and a certain iterative mechanism is used to form
The hash function of.
GB/T 18238 "Network Security Technology Hash Function" consists of three parts.
--- Part 1.General. The purpose is to specify the requirements and general model of hash functions to guide other
part.
--- Part 2.Hash functions for block ciphers. The purpose is to specify hash functions for block ciphers.
--- Part 3.Specially designed hash functions. The purpose is to specify specially designed hash functions.
Network security technology hash function
Part 2.Hash functions using block ciphers
1 Scope
This document specifies three hash functions for use with (n-bit) block ciphers. The first hash function provides a hash of length no greater than n bits.
The first hash function provides a 2n-bit hash value, the second hash function provides a 2n-bit hash value, and the third hash function provides a 3n-bit hash value.
This document applies to the design, development, and testing of hash functions employed in block ciphers.
2 Normative references
The contents of the following documents constitute essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 18238.1-2024 Network security technology hash functions Part 1.General (ISO /IEC 10118-1.2016,
MOD)
Note. There is no technical difference between the referenced content of GB/T 18238.1-2024 and the referenced content of ISO /IEC 10118-1.2000.
GB/T 25069-2022 Information Security Technical Terminology
3 Terms and definitions
The terms and definitions defined in GB/T 25069-2022 and GB/T 18238.1-2024 and the following apply to this document.
3.1
Grouping blocks
A sequence of elements recorded or transmitted as a unit.
Note. Here, elements are characters, words or records.
[Source. GB/T 25069-2022, 3.354]
3.2
Block cipher
A cryptographic algorithm is a symmetric encryption system that operates on blocks of plaintext (i.e., strings of bits of a defined length) to produce blocks of ciphertext.
[Source. GB/T 25069-2022, 3.161]
4 Symbols
The following symbols apply to this document.
BL. When n is an even number, the leftmost n/2 bits of the n-bit string B; when n is an odd number, the leftmost n 1()/2 bits of the n-bit string B
Bit string.
BR. When n is an even number, the rightmost n/2 bits of the n-bit string B; when n is an odd number, the rightmost n-1()/2 bits of the n-bit string B
Bit string.
Bi. When B is a sequence of multiple m-bit words, Bi(i≥0) represents the i-th m-bit word of B. In particular, when m=8
...