ISO IEC 10118-2-2010 cor1-2011 PDF

St ISO IEC 10118-2-2010 cor1-2011

Name in English:
St ISO IEC 10118-2-2010 cor1-2011

Name in Russian:
Ст ISO IEC 10118-2-2010 cor1-2011

Description in English:

Original standard ISO IEC 10118-2-2010 cor1-2011 in PDF full version. Additional info + preview on request

Description in Russian:
Оригинальный стандарт ISO IEC 10118-2-2010 cor1-2011 в PDF полная версия. Дополнительная инфо + превью по запросу
Document status:
Active

Format:
Electronic (PDF)

Delivery time (for English version):
1 business day

Delivery time (for Russian version):
365 business days

SKU:
stiso23649

Choose Document Language:
€25

Full title and description

St ISO IEC 10118-2-2010 cor1-2011 — Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher; includes Technical Corrigendum 1 (published 2011) to the 2010 edition. The part specifies four block-cipher-based hash functions intended for environments where an n-bit block cipher (for example AES or other ciphers specified in ISO/IEC 18033‑3) is already available, and defines the algorithms, output lengths and conformance to the general model in ISO/IEC 10118‑1.

Abstract

This document (edition 3, 2010) describes hash functions constructed from an n-bit block cipher. Four constructions are given producing hash outputs of lengths ≤ n, ≤ 2n, = 2n and = 3n. The text assumes modern block ciphers (moving beyond older assumptions such as DEA) and references block-cipher specifications in ISO/IEC 18033‑3. The 2011 corrigendum corrects editorial/technical items in the 2010 text.

General information

  • Status: Published (international standard with published corrigendum).
  • Publication date: Original edition published October 2010; Technical Corrigendum 1 published December 2011.
  • Publisher: ISO/IEC (prepared by JTC 1/SC 27).
  • ICS / categories: 35.030 (Information technology — Security techniques).
  • Edition / version: Third edition (2010), with Corrigendum 1 (2011).
  • Number of pages: 29 pages for the 2010 standard; Corrigendum 1 is 2 pages (corrections to the 2010 text).

Scope

Specifies four cryptographic hash-function constructions that are built from an underlying n-bit block cipher. The standard is intended for implementers who already have a block cipher available and need a standardized way to derive hash codes of various fixed lengths (up to 3·n). It requires conformance to the general model in ISO/IEC 10118‑1 and references block-cipher definitions in ISO/IEC 18033‑3. The 2011 corrigendum makes targeted corrections and clarifications to the 2010 text.

Key topics and requirements

  • Specifications of four block‑cipher‑based hash constructions (output lengths: ≤ n, ≤ 2n, = 2n, = 3n).
  • Requirement to use an n‑bit block cipher as the primitive (examples and rationale reference AES and modern ciphers rather than legacy DEA).
  • Conformance to the general hash‑function model in ISO/IEC 10118‑1 (input processing, padding, and overall structure).
  • Test vectors, algorithm descriptions and formal parameters as required for interoperable implementations (plus corrigendum fixes where applicable).
  • Compatibility notes and replacement of earlier 2000 edition and previous corrigenda; guidance for implementers migrating from prior assumptions.

Typical use and users

Implementers of cryptographic libraries and hardware modules who prefer or require hash constructions derived from an existing block cipher; security architects designing systems where reuse of an available block cipher is desirable; evaluators and certifiers assessing conformance to international standards; standards bodies and test labs. Engineers working on embedded or constrained devices that already include a block cipher may use these constructions to avoid adding a separate dedicated hash primitive.

Related standards

Part of the ISO/IEC 10118 series (see ISO/IEC 10118‑1 General, ISO/IEC 10118‑3 Dedicated hash‑functions, ISO/IEC 10118‑4 legacy constructions). Also references ISO/IEC 18033‑3 for block‑cipher specifications and other JTC1/SC27 cryptographic technique standards. The 2010 edition replaces the 2000 edition and earlier corrigenda.

Keywords

hash function, block cipher, n‑bit block cipher, AES, ISO/IEC 10118‑2, corrigendum, cryptographic hash, JTC 1/SC 27, security techniques.

FAQ

Q: What is this standard?

A: ISO/IEC 10118‑2:2010 (with Corrigendum 1:2011) is the international standard that specifies hash‑function constructions built from an n‑bit block cipher. It is the third edition of Part 2 in the ISO/IEC 10118 series.

Q: What does it cover?

A: It defines four block‑cipher‑based hash constructions (producing hash codes of various lengths up to 3n), formal algorithm descriptions, parameters and conformance to the general model in ISO/IEC 10118‑1. The corrigendum issued in December 2011 corrects specific editorial/technical items in the 2010 text.

Q: Who typically uses it?

A: Cryptographic library developers, hardware module designers, security architects, test laboratories and evaluators who need a standardized, interoperable way to obtain hash codes from an existing block cipher implementation.

Q: Is it current or superseded?

A: The 2010 third edition with Corrigendum 1 (2011) is the published edition. According to the ISO record this edition was reviewed and confirmed (remains current as of the last ISO review cycle). Users should check the ISO catalogue or their national standards body for any later amendments, confirmations or withdrawals before relying on it in new projects.

Q: Is it part of a series?

A: Yes — it is Part 2 of the ISO/IEC 10118 series on hash‑functions; see Part 1 (general), Part 3 (dedicated hash‑functions) and Part 4 (legacy constructions). It is related to block‑cipher standards such as ISO/IEC 18033‑3.

Q: What are the key keywords?

A: Hash function, block cipher, n‑bit, AES, ISO/IEC 10118‑2, corrigendum, cryptographic standard, JTC 1/SC 27.