ISO/IEC 10118-2:2010
Current
The latest, up-to-date edition.
Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
10-11-2010
ISO/IEC 10118-2:2010 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Block ciphers are specified in ISO/IEC 18033-3.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in ISO/IEC 10118-2:2010 conform to the general model specified in ISO/IEC 10118-1.
DevelopmentNote |
Supersedes ISO 10118-2 (04/2001)
|
DocumentType |
Standard
|
Pages |
29
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
AS ISO/IEC 10118.2-2006 | Identical |
INCITS/ISO/IEC 10118-2 : 2011 | Identical |
NEN ISO/IEC 10118-2 : 2011 C1 2011 | Identical |
SANS 18-2 : 2ED 2011(R2017) | Identical |
BS ISO/IEC 10118-2:2010 | Identical |
INCITS/ISO/IEC 10118-2:2010(R2016) | Identical |
CSA ISO/IEC 10118-2 : 2012 | Identical |
CAN/CSA-ISO/IEC 10118-2:12 (R2016) | Identical |
CSA ISO/IEC 10118-2 : 2012 : INC : COR 1 : 2013 | Identical |
INCITS/ISO/IEC 10118-2:2010(R2021) | Identical |
BS EN 50159-2:2001 | Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
BS ISO 9735-6:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules Secure authentication and acknowledgement message (message type AUTACK) |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
14/30250091 DC : 0 | BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CAN/CSA-ISO/IEC 18033-2:06 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO 9735-6:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure authentication and acknowledgement message (message type - AUTACK) |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN/TS 14821-1:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 1: GENERAL SPECIFICATIONS |
CEN/TS 14821-5:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES |
CEN/TS 14821-8:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 8: GSM-SPECIFIC PARAMETERS |
CEN/TS 14821-4:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 4: SERVICE-INDEPENDENT PROTOCOLS |
CEN/TS 14821-6:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 6: EXTERNAL SERVICES |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CR 13643 : 2000 | MACHINE READABLE CARDS - HEALTHCARE APPLICATIONS - LOGICAL DATA STRUCTURES AND CONCEPTS FOR DIFFERENT CARD TECHNOLOGIES FOR USE BY PATIENTS IN HEALTH APPLICATIONS |
CSA ISO/IEC 18033-2 :2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
DD CEN/TS 14821-2:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Numbering and ADP message header |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
02/652661 DC : DRAFT NOV 2002 | ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 13888-3 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
I.S. EN ISO/IEC 27043:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 13888-3:2009 | Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 27043:2015 | Information technology Security techniques Incident investigation principles and processes |
I.S. EN ISO/IEC 7816-4:1998 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
DD CEN/TS 14821-7:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Performance requirements for onboard positioning |
BS ISO/IEC 27043 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
DD CEN/TS 14821-3:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Basic information elements |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
I.S. CR 13643:2000 | MACHINE READABLE CARDS - HEALTHCARE APPLICATIONS - LOGICAL DATA STRUCTURES AND CONCEPTS FOR DIFFERENT CARD TECHNOLOGIES FOR USE BY PATIENTS IN HEALTH APPLICATIONS |
I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
EN ISO/IEC 27043:2016 | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
PD CR 13643:2001 | Machine readable cards. Healthcare applications. Logical data structures and concepts for different card technologies for use by patients in health applications |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
BS ISO/IEC 29192-1:2012 | Information technology. Security techniques. Lightweight cryptography General |
BS EN ISO/IEC 27043:2016 | Information technology. Security techniques. Incident investigation principles and processes |
BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
DD CEN/TS 14821-1:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks General specifications |
07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
11/30204850 DC : 0 | BS ISO/IEC 29192-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 1: GENERAL |
DD CEN/TS 14821-4:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Service-independent protocols |
DD CEN/TS 14821-6:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks External services |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
IEEE 1377-2012 | IEEE Standard for Utility Industry Metering Communication Protocol Application Layer (End Device Data Tables) |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO 9735-5:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
ISO/IEC 29192-1:2012 | Information technology — Security techniques — Lightweight cryptography — Part 1: General |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
CEN/TS 14821-3:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 3: BASIC INFORMATION ELEMENTS |
EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO 9735-5:2002 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
NF EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
INCITS/ISO/IEC 18033-1 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
BS ISO/IEC 18033-1:2015 | Information technology. Security techniques. Encryption algorithms General |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
13/30260172 DC : 0 | BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 27043 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
DD CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
DD CEN/TS 14821-8:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks GSM-specific parameters |
CSA ISO/IEC 18033-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 13888-3:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
I.S. EN 50159-2:2001 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
DIN ISO 9735-5:2004-01 | Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) (ISO 9735-5:2002) |
CEN/TS 14821-2:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 2: NUMBERING AND ADP MESSAGE HEADER |
CEN/TS 14821-7:2003 | TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 7: PERFORMANCE REQUIREMENTS FOR ONBOARD POSITIONING |
DIN ISO 9735-6:2004-01 | Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 6: Secure authentication and acknowledgement message (message type - AUTACK) (ISO 9735-6:2002) |
EN 50159-2 : 2001 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.