• There are no items in your cart

BS ISO/IEC 10118-1:2016+A1:2021

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Hash-functions General

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

03-16-2021

ISO/IEC10118 (allparts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

  • reducing a message to a short imprint for input to a digital signature mechanism, and

  • committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC10118 (allparts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC9797‑2[1].

This document contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC10118 are defined in Annex B of this document.

Committee
IST/33
DocumentType
Standard
Pages
20
PublisherName
British Standards Institution
Status
Current
Supersedes

View more information
US$175.67
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.