ISO IEC 10118-2-2010 cor1-2011 PDF
Name in English:
St ISO IEC 10118-2-2010 cor1-2011
Name in Russian:
Ст ISO IEC 10118-2-2010 cor1-2011
Original standard ISO IEC 10118-2-2010 cor1-2011 in PDF full version. Additional info + preview on request
Full title and description
St ISO IEC 10118-2-2010 cor1-2011 — Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher; includes Technical Corrigendum 1 (published 2011) to the 2010 edition. The part specifies four block-cipher-based hash functions intended for environments where an n-bit block cipher (for example AES or other ciphers specified in ISO/IEC 18033‑3) is already available, and defines the algorithms, output lengths and conformance to the general model in ISO/IEC 10118‑1.
Abstract
This document (edition 3, 2010) describes hash functions constructed from an n-bit block cipher. Four constructions are given producing hash outputs of lengths ≤ n, ≤ 2n, = 2n and = 3n. The text assumes modern block ciphers (moving beyond older assumptions such as DEA) and references block-cipher specifications in ISO/IEC 18033‑3. The 2011 corrigendum corrects editorial/technical items in the 2010 text.
General information
- Status: Published (international standard with published corrigendum).
- Publication date: Original edition published October 2010; Technical Corrigendum 1 published December 2011.
- Publisher: ISO/IEC (prepared by JTC 1/SC 27).
- ICS / categories: 35.030 (Information technology — Security techniques).
- Edition / version: Third edition (2010), with Corrigendum 1 (2011).
- Number of pages: 29 pages for the 2010 standard; Corrigendum 1 is 2 pages (corrections to the 2010 text).
Scope
Specifies four cryptographic hash-function constructions that are built from an underlying n-bit block cipher. The standard is intended for implementers who already have a block cipher available and need a standardized way to derive hash codes of various fixed lengths (up to 3·n). It requires conformance to the general model in ISO/IEC 10118‑1 and references block-cipher definitions in ISO/IEC 18033‑3. The 2011 corrigendum makes targeted corrections and clarifications to the 2010 text.
Key topics and requirements
- Specifications of four block‑cipher‑based hash constructions (output lengths: ≤ n, ≤ 2n, = 2n, = 3n).
- Requirement to use an n‑bit block cipher as the primitive (examples and rationale reference AES and modern ciphers rather than legacy DEA).
- Conformance to the general hash‑function model in ISO/IEC 10118‑1 (input processing, padding, and overall structure).
- Test vectors, algorithm descriptions and formal parameters as required for interoperable implementations (plus corrigendum fixes where applicable).
- Compatibility notes and replacement of earlier 2000 edition and previous corrigenda; guidance for implementers migrating from prior assumptions.
Typical use and users
Implementers of cryptographic libraries and hardware modules who prefer or require hash constructions derived from an existing block cipher; security architects designing systems where reuse of an available block cipher is desirable; evaluators and certifiers assessing conformance to international standards; standards bodies and test labs. Engineers working on embedded or constrained devices that already include a block cipher may use these constructions to avoid adding a separate dedicated hash primitive.
Related standards
Part of the ISO/IEC 10118 series (see ISO/IEC 10118‑1 General, ISO/IEC 10118‑3 Dedicated hash‑functions, ISO/IEC 10118‑4 legacy constructions). Also references ISO/IEC 18033‑3 for block‑cipher specifications and other JTC1/SC27 cryptographic technique standards. The 2010 edition replaces the 2000 edition and earlier corrigenda.
Keywords
hash function, block cipher, n‑bit block cipher, AES, ISO/IEC 10118‑2, corrigendum, cryptographic hash, JTC 1/SC 27, security techniques.
FAQ
Q: What is this standard?
A: ISO/IEC 10118‑2:2010 (with Corrigendum 1:2011) is the international standard that specifies hash‑function constructions built from an n‑bit block cipher. It is the third edition of Part 2 in the ISO/IEC 10118 series.
Q: What does it cover?
A: It defines four block‑cipher‑based hash constructions (producing hash codes of various lengths up to 3n), formal algorithm descriptions, parameters and conformance to the general model in ISO/IEC 10118‑1. The corrigendum issued in December 2011 corrects specific editorial/technical items in the 2010 text.
Q: Who typically uses it?
A: Cryptographic library developers, hardware module designers, security architects, test laboratories and evaluators who need a standardized, interoperable way to obtain hash codes from an existing block cipher implementation.
Q: Is it current or superseded?
A: The 2010 third edition with Corrigendum 1 (2011) is the published edition. According to the ISO record this edition was reviewed and confirmed (remains current as of the last ISO review cycle). Users should check the ISO catalogue or their national standards body for any later amendments, confirmations or withdrawals before relying on it in new projects.
Q: Is it part of a series?
A: Yes — it is Part 2 of the ISO/IEC 10118 series on hash‑functions; see Part 1 (general), Part 3 (dedicated hash‑functions) and Part 4 (legacy constructions). It is related to block‑cipher standards such as ISO/IEC 18033‑3.
Q: What are the key keywords?
A: Hash function, block cipher, n‑bit, AES, ISO/IEC 10118‑2, corrigendum, cryptographic standard, JTC 1/SC 27.