Your cart is currently empty!

ISO 10118:2016
ISO 10118:2016 Information technology – Security techniques – Hash-functions – Part 1: General
CDN $115.00
Description
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
– reducing a message to a short imprint for input to a digital signature mechanism, and
– committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‚Äë2 [1].
ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.
Edition
3
Published Date
2016-10-14
Status
PUBLISHED
Pages
12
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‚Äë2 [1].
ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 27554:2024 Information security, cybersecurity and privacy protection – Application of ISO 31000 for assessment of identity-related risk
0 out of 5CDN $173.00 Add to cart -
ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
0 out of 5CDN $273.00 Add to cart -
ISO 27562:2024 Information technology – Security techniques – Privacy guidelines for fintech services
0 out of 5CDN $273.00 Add to cart -
ISO 21177:2024 Intelligent transport systems – ITS station security services for secure session establishment and authentication between trusted devices
0 out of 5CDN $390.00 Add to cart