REGISTER

FR
Search
×
FR

Placeholder headline

This is just a placeholder headline

API SPEC 14L: Lock Mandrels and Landing Nipples : Reaffirmed

$

273

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 20F: Corrosion Resistant Bolting for Use in the Petroleum and Natural Gas Industries : Reaffirmed

$

169

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 5NCL Nickel Content Limits for API 5CT Sour Service Products

$

149

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 19ICD: Inflow Control Devices : Reaffirmed

$

189

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 23.2: Reconciliation of Liquid Tank Car(s) Quantities : Reaffirmed

$

218

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 16A: Specification for Drill-through Equipment

$

322

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-2: Field Testing Oil-based Drilling Fluids wA1

$

388

BUY NOW

ISO 10118:2016

ISO 10118:2016 Information technology – Security techniques – Hash-functions – Part 1: General

CDN $115.00

SKU: 59cc9cfe9376 Category:

Description

ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

– reducing a message to a short imprint for input to a digital signature mechanism, and

– committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‚Äë2 [1].

ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.

Edition

3

Published Date

2016-10-14

Status

PUBLISHED

Pages

12

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

- reducing a message to a short imprint for input to a digital signature mechanism, and

- committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‚Äë2 [1].

ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.

Previous Editions

Can’t find what you are looking for?

Please contact us at: