State Standard of the Russian Federation. GOST No. 34.11-94

logo11d 4 1

State Standard of the Russian Federation. GOST No. 34.11-94 Information technology. Cryptographic protection of information. Caching function.

STATE STANDARD OF THE RUSSIAN FEDERATION

GOST No. 34.11-94

Information technology.

Cryptographic protection of information.

Caching function.

Date of introduction 01/01/95

KGS code P85
Code OKSTU 5002
GRNTI rubricator index 5041
OKS Code 35.040, 35.060, 35.080, 35.100, 35.140, 35.240
Type of Standard. Process Standards
Type of Requirements Unclassifiable Categories

Preface

1. Developed by the Main Directorate for Communications Security of the Federal Agency for Government Communications and Information and the All-Russian Research Institute for Standardization.

Introduced by the Technical Committee for Standardization TC 22 “Information Technology” and the Federal Agency for Government Communications and Information.

2. Adopted and put into effect by Resolution of the State Standard of Russia dated 23.05.94 No. 154

3. Introduced for the first time

Introduction

The expanding use of information technology in the creation, processing, transmission and storage of documents requires, in certain cases, maintaining the confidentiality of their content, ensuring completeness and reliability.

One of the effective areas of information protection is cryptography (cryptographic information), widely used in various areas of activity in government and commercial structures.

Cryptographic methods of information protection are the subject of serious scientific research and standardization at the national, regional and international levels.

This standard defines a procedure for calculating a hash function for any sequence of binary symbols.

The hash function consists of comparing an arbitrary set of data in the form of a sequence of binary symbols and its image of a fixed short length, which allows this function to be used in electronic digital signature procedures to reduce the time of signing and signature verification. The effect of reducing time is achieved by calculating the signature only under the image of the signed set of data.

1. Scope

This standard defines the algorithm and procedure for calculating the hash function for any sequence of binary symbols that are used in cryptographic methods of processing and protecting information, including for the implementation of electronic digital signature (EDS) procedures during the transfer, processing and storage of information in automated systems.

The hash function defined in this standard is used in the implementation of electronic digital signature systems based on the asymmetric cryptographic algorithm according to GOST R 34.10.

2. Normative references

This standard uses references to the following standards:

GOST 28147-89 Information processing systems. Cryptographic protection. Cryptographic pre-transformation algorithms.

GOST R 34.10-94 Information technology. Cryptographic protection of information. Procedures for generating and verifying an electronic digital signature based on an asymmetric cryptographic algorithm.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять