Standard ISO standard · ISO/IEC 10118-3:2018

IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions

Status: Valid

Buy this standard

Standard ISO standard · ISO/IEC 10118-3:2018

IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions
Subscribe on standards - Read more Dölj
Price: 2 819 SEK
standard ikon pdf

PDF

Price: 2 819 SEK
standard ikon

Paper

Show more Show less
Preview this standard
Scope
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.
The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.
NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797‑2, or in key derivation functions specified in ISO/IEC 11770‑6, their use is not deprecated.
Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.

Subjects

IT Security (35.030)


Buy this standard

Standard ISO standard · ISO/IEC 10118-3:2018

IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions
Subscribe on standards - Read more Dölj
Price: 2 819 SEK
standard ikon pdf

PDF

Price: 2 819 SEK
standard ikon

Paper

Show more Show less

Product information

Language: English

Written by: ISO

International title:

Article no: STD-80007636

Edition: 4

Approved: 10/31/2018

No of pages: 398

Replaces: ISO/IEC 10118-3:2004