ISO/IEC 10118-4:1998
Current
The latest, up-to-date edition.
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
Hardcopy , PDF
20-12-1998
This part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-functions,
which are believed to be collision-resistant, compress messages of arbitrary but limited length to a hash-code
whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,
the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identification
scheme).
The hash-functions specified in this part of ISO/IEC 10118, known as MASH-1 and MASH-2 (Modular Arithmetic
Secure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficient
length are already available. The two hash-functions differ only in the exponent used in the round-function.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
23
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Standards | Relationship |
| NEN ISO/IEC 10118-4 : 1999 AMD 1 2014 | Identical |
| BS ISO/IEC 10118-4 : 1998 | Identical |
| INCITS/ISO/IEC 10118-4 : 1998 | Identical |
| PN ISO/IEC 10118-4 : 2001 | Identical |
| AS ISO/IEC 10118.4-2006 | Identical |
| INCITS/ISO/IEC 10118-4:1998(S2023) | Identical |
| INCITS/ISO/IEC 10118-4:1998(S2023) | Identical |
| NEN-ISO/IEC 10118-4:1999 | Identical |
| JIS X 5057-4:2003 | Identical |
| 08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
| 08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
| 09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/IEC 13888-3:2009 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques |
| BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
| BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
| 07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
| 08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
| I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
| BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
| ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
| IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
| EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| 07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
| BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
| 06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
| DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
| 09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
| 07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
| 07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
| UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| INCITS/ISO/IEC 20008-1:2013(R2019) | Information technology - Security techniques - Anonymous digital signatures - Part 1: General<br> |
| INCITS/ISO/IEC 24727-3:2008(R2019) | Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface |
| INCITS/ISO/IEC 18370-1:2016(2019) | Information technology -- Security techniques -- Blind digital signatures -- Part 1: General |
| INCITS/ISO/IEC 15444-8:2007[R2019] | Information technology - JPEG 2000 image coding system: Secure JPEG 2000<br> |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.