BS ISO/IEC 10118-1:2016+A1:2021
$102.76
Information technology. Security techniques. Hash-functions – General
Published By | Publication Date | Number of Pages |
BSI | 2021 | 20 |
ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
-
reducing a message to a short imprint for input to a digital signature mechanism, and
-
committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‑2[1].
This document contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | 1 Scope 2 Normative references 3 Terms and definitions |
8 | 4 Symbols and abbreviated terms 4.1 General symbols |
9 | 4.2 Symbols specific to this document 4.3 Coding conventions 5 Requirements 6 General model for hash-functions 6.1 General |
10 | 6.2 Hashing operation 6.2.1 General 6.2.2 Step 1 (padding) 6.2.3 Step 2 (splitting) 6.2.4 Step 3 (iteration) 6.2.5 Step 4 (output transformation) |
11 | 6.3 Use of the general model |
12 | Annex A (normative) Padding methods |
13 | Annex B (normative) Criteria for submission of hash-functions for possible inclusion in ISO/IEC 10118 (all parts) |
16 | Annex C (informative) Security considerations |
18 | Bibliography |