UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 10118-1

Information technology - Security techniques - Hash-functions - Part 1: General

active, Most Current
Buy Now
Organization: ISO
Publication Date: 15 October 2016
Status: active
Page Count: 18
ICS Code (Information coding): 35.040
scope:

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

- reducing a message to a short imprint for input to a digital signature mechanism, and

- committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797-2 [1].

This document contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.

Document History

August 10, 2020
Information technology — Security techniques — Hashfunctions — Part 1: General AMENDMENT 1: Padding methods for sponge functions
A description is not available for this item.
ISO/IEC 10118-1
October 15, 2016
Information technology - Security techniques - Hash-functions - Part 1: General
ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of...
June 15, 2000
Information Technology - Security Techniques - Hash-Functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map arbitrary strings of bits to a...
January 1, 1994
Information Technology - Security Techniques - Hash-Functions - Part 1: General
A description is not available for this item.

References

Advertisement