ISO IEC 10118-2-2010 PDF
Name in English:
St ISO IEC 10118-2-2010
Name in Russian:
Ст ISO IEC 10118-2-2010
Original standard ISO IEC 10118-2-2010 in PDF full version. Additional info + preview on request
Full title and description
ISO/IEC 10118-2:2010 — Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher. This part of ISO/IEC 10118 specifies four hash-functions that are constructed using an n-bit block cipher (suitable where such a cipher is already implemented) and conforms to the general model defined in ISO/IEC 10118-1.
Abstract
Specifies four block-cipher-based hash-functions: one producing hash-codes of length ≤ n (where n is the block length of the underlying block cipher), one producing hash-codes of length ≤ 2n, one producing hash-codes of length = 2n, and one producing hash-codes of length = 3n. The document assumes the block cipher is defined separately (see ISO/IEC 18033-3) and that the hash-functions follow the general model in ISO/IEC 10118-1.
General information
- Status: Published (confirmed on periodic review; remains current).
- Publication date: October 2010 (Edition 3, 2010).
- Publisher: ISO/IEC (joint international standard).
- ICS / categories: 35.030 — IT security techniques / Hash-functions.
- Edition / version: Edition 3 (2010); Technical Corrigendum 1 published 2011.
- Number of pages: 29 pages.
Summary information above is taken from the ISO catalogue entry for ISO/IEC 10118-2:2010 and its corrigendum.
Scope
Defines hash-functions built from an n-bit block cipher algorithm so they can be used where an appropriate block cipher is already available. The part describes the constructions, output length variants (≤ n, ≤ 2n, = 2n, = 3n), and normative requirements that ensure conformance with the general model given in ISO/IEC 10118-1; block-cipher specifications are referenced (for example ISO/IEC 18033-3).
Key topics and requirements
- Definitions and notation consistent with ISO/IEC 10118-1 (general model for hash-functions).
- Four specific block-cipher-based hash-function constructions (output lengths ≤ n, ≤ 2n, = 2n, = 3n).
- Dependence on an underlying n-bit block cipher (block-cipher algorithms are out-of-scope and referenced, e.g., ISO/IEC 18033-3).
- Conformance criteria and algorithm parameterization to ensure interoperability with other parts of ISO/IEC 10118.
- Normative and informative material sufficient for implementers to compute hash-codes according to the specified constructions (including examples/corrections provided via corrigendum).
These topics and requirements are described in the standard and its corrigendum; implementers should consult ISO/IEC 10118-1 for shared definitions and constraints.
Typical use and users
Intended for cryptographic system designers, implementers of security libraries, and evaluators who need block-cipher-based hash-functions where a block cipher is already available or mandated. Common uses include message digest generation for integrity checks, inputs to higher-level protocols (signatures, MAC constructions when combined appropriately), and legacy systems that rely on block-cipher-based hashing constructions. For general applicability and service descriptions (authentication, integrity, non-repudiation) refer to ISO/IEC 10118-1.
Related standards
Key related parts and documents: ISO/IEC 10118-1 (General — common definitions and model for hash-functions), ISO/IEC 10118-3 (Dedicated hash-functions), ISO/IEC 18033-3 (block cipher specifications referenced by this part), ISO/IEC 10118-2:2010/Corrigendum 1 (2011) which issues technical corrections to this edition. These related documents define the general model, alternative dedicated hash-functions, and the block-cipher primitives referenced by the constructions in Part 2.
Keywords
hash-function, block cipher, n-bit block cipher, hash-code length, ISO/IEC 10118, data integrity, cryptographic digest, interoperability, JTC 1/SC 27.
FAQ
Q: What is this standard?
A: ISO/IEC 10118-2:2010 is the part of the ISO/IEC 10118 family that specifies hash-functions constructed from an n-bit block cipher (four variants producing hash-codes of different lengths).
Q: What does it cover?
A: It defines the constructions, parameterization and normative requirements for four block-cipher-based hash-functions (output lengths ≤ n, ≤ 2n, = 2n, = 3n), and references the block-cipher specifications used as primitives (e.g., ISO/IEC 18033-3).
Q: Who typically uses it?
A: Cryptographic library developers, system integrators, security evaluators, and standards bodies that need block-cipher-based hash constructions or must support environments where a particular block cipher is already implemented.
Q: Is it current or superseded?
A: ISO/IEC 10118-2:2010 (Edition 3) is the published edition from October 2010 and was issued a technical corrigendum in 2011; the ISO catalogue entry shows the publication was reviewed and confirmed (remains current) during its periodic review. Implementers should also consult the corrigendum for corrections.
Q: Is it part of a series?
A: Yes — it is Part 2 of ISO/IEC 10118 (Hash-functions). Other parts include ISO/IEC 10118-1 (general model) and ISO/IEC 10118-3 (dedicated hash-functions), among any subsequent parts and amendments.
Q: What are the key keywords?
A: Hash-function; block cipher; n-bit block cipher; hash-code length; interoperability; cryptographic digest; ISO/IEC 10118; JTC 1/SC 27.