Information Technology - Security Techniques - Hash-Functions - Part 1: General
|Publication Date:||15 June 2000|
|ICS Code (Information coding):||35.040|
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map arbitrary strings of bits to a fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string. NOTE - The hash-functions specified in this part of ISO/IEC 10118 do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. For the calculation of a MAC the user is referred to ISO/IEC 9797.
This part of ISO/IEC 10118 contains definitions, symbols, abbreviations and requirements, that are common to all the other parts of ISO/IEC 10118.