UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

ISO/IEC 10118-2

Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher TECHNICAL CORRIGENDUM 1

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 December 2011
Status: active
Page Count: 2
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented.

Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.

Document History

ISO/IEC 10118-2
December 1, 2011
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher TECHNICAL CORRIGENDUM 1
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already...
October 15, 2010
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already...
February 15, 2007
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher TECHNICAL CORRIGENDUM 2
A description is not available for this item.
October 1, 2006
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher TECHNICAL CORRIGENDUM 1
A description is not available for this item.
December 15, 2000
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
A description is not available for this item.
January 1, 1994
Information Technology - Security Techniques - Hash-Functions - Part 2: Hash-Functions Using an n-Bit Block Cipher Algorithm
A description is not available for this item.

References

Advertisement