UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

CSA ISO/IEC 10118-3:19

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

active, Most Current
Organization: CSA
Publication Date: 1 January 2019
Status: active
Page Count: 417
ICS Code (IT Security): 35.030
scope:

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.

NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797-2, or in key derivation functions specified in ISO/IEC 11770-6, their use is not deprecated.

Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.

Document History

CSA ISO/IEC 10118-3:19
January 1, 2019
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct...
Information Technology - Security Techniques - Hash-Functions - Part 3: Dedicated Hash-Functions
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
January 1, 2007
Amendment 1:2007 (IDT) to CSA ISO/IEC 10118-3:04 Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions AMENDMENT 1: Dedicated Hash-Function 8 (SHA-224)
A description is not available for this item.
January 1, 2007
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions AMENDMENT 1: Dedicated Hash-Function 8 (SHA-224)
Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies...
December 1, 2004
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
This part of ISO/IEC 10118 specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this part of ISO/IEC 10118 are based on the iterative use of a...
December 1, 2004
Information Technology - Security Techniques - Hash-Functions - Part 3: Dedicated Hash-Functions
This part of ISO/IEC 10118 specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this part of ISO/IEC 10118 are based on the iterative use of a...
January 1, 2004
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
This part of ISO/IEC 10118 specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this part of ISO/IEC 10118 are based on the iterative use of a...
January 1, 2004
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
This part of ISO/IEC 10118 specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this part of ISO/IEC 10118 are based on the iterative use of a...
February 1, 2001
Information Technology - Security Techniques - Hash-Functions - Part 3: Dedicated Hash-Functions
This part of ISO/IEC 10118 specifies dedicated hashfunctions, i.e. specially designed hash-functions. The hash-functions in this part of ISO/IEC 10118 are based on the iterative use of a...

References

Advertisement