• CAN/CSA-ISO/IEC 10118-2:12 (R2016)

    Current The latest, up-to-date edition.

    Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2012

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Use of the general model
    6 Hash-function 1
    7 Hash-function 2
    8 Hash-function 3
    9 Hash-function 4
    Annex A (informative) - Use of AES
    Annex B (informative) - Examples
    Annex C (normative) - ASN.1 Module
    Bibliography

    Abstract - (Show below) - (Hide below)

    This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.

    Scope - (Show below) - (Hide below)

    Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 10118-2-02 (adoption of ISO/IEC 10118-2:2000, second edition, 2000-12-15). At the time of publication, ISO/IEC 10118-2:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective