ISO/IEC 10118-3:2018 PDF

ISO/IEC 10118-3:2018 PDF

Name:
ISO/IEC 10118-3:2018 PDF

Published Date:
10/01/2018

Status:
Active

Description:

IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$83.4
Need Help?

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.

NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797-2, or in key derivation functions specified in ISO/IEC 11770-6, their use is not deprecated.

Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.


File Size : 1 file , 2.7 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 10/01/2018
Same As : ISO/IEC 10118-3:2018

History

ISO/IEC 10118-3:2018
Published Date: 10/01/2018
IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
$83.4
ISO/IEC 10118-3 Ed. 1.0 en CORR1:2011
Published Date: 11/28/2011
Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions -
Free Download
ISO/IEC 10118-3:2004
Published Date: 03/01/2004
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
$69.6

Related products

ISO/IEC 18033-3:2010
Published Date: 12/15/2010
Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
$75
ISO/IEC TS 27008:2019
Published Date: 02/01/2019
Information technology - Security techniques - Guidelines for the assessment of information security controls
$83.4

Best-Selling Products

RIA-A3 R15.05-1-1990 (R1999)
Published Date: 01/01/1999
Evaluation of Point-to-Point and Static Performance Characteristics of Industrial Robots and Robot Systems
RIA-A3 R15.05-2-1992 (R1999)
Published Date: 01/01/1999
Industrial Robots and Robot Systems - Path-Related and Dynamic Performance Characteristics - Evaluation
RIA-A3 R15.05-3-1992 (R1999)
Published Date: 01/01/1999
Industrial Robots and Robot Systems - Reliability Acceptance Testing - Guidelines
RIA-A3 R15.06-1999 (R2009)
Published Date: 01/01/1999
Industrial Robots and Robot Systems - Safety Requirements
RIA-A3 R15.06-2012
Published Date: 03/28/2013
Industrial Robots and Robot Systems - Safety Requirements
$97.5
RIA-A3 R15.08-1-2020
Published Date: 12/25/2020
Industrial Robots and Robot Systems - Safety Requirements Part 1: Requirements for the Industrial Mobile Robot
$67.5