• Shopping Cart
    There are no items in your cart

ISO/IEC 10118-3:2018

Current

Current

The latest, up-to-date edition.

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

31-10-2018

€213.00
Excluding VAT

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.

NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797‑2, or in key derivation functions specified in ISO/IEC 11770‑6, their use is not deprecated.

Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
398
PublisherName
International Organization for Standardization
Status
Current
Supersedes

INCITS/ISO/IEC 11889-4:2015(2019) Information technology — Trusted Platform Module Library — Part 4: Supporting Routines
INCITS/ISO/IEC 11889-2:2015(2019) Information technology -- Trusted Platform Module Library -- Part 2: Structures
INCITS/ISO/IEC 11889-1:2015(R2024) Information technology — Trusted Platform Module Library — Part 1: Architecture
INCITS/ISO/IEC 9798-3 : 2019(R2024) IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
INCITS/ISO/IEC 9798-3:2019(2019) IT Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
INCITS/ISO/IEC 20889:2018 (2019) Privacy enhancing data de-identification terminology and classification of techniques
INCITS/ISO/IEC 11889-1:2015(2019) Information technology -- Trusted platform module library -- Part 1: Architecture

AS 2805.6.5.3:2020 Electronic funds transfer - Requirements for interfaces Key management - TCU initialization - Asymmetric

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€213.00
Excluding VAT