Abstract
PreviewISO/IEC 10118-2:2010 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Block ciphers are specified in ISO/IEC 18033-3.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in ISO/IEC 10118-2:2010 conform to the general model specified in ISO/IEC 10118-1.
-
Status: PublishedPublication date: 2010-10
-
Edition: 3Number of pages: 29
-
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
-
- ICS :
- 35.030 IT Security
Buy this standard
Format | Language | |
---|---|---|
std 1 145 | ||
std 2 145 | Paper |
- CHF145
Life cycle
-
Previously
WithdrawnISO/IEC 10118-2:2000
WithdrawnISO/IEC 10118-2:2000/Cor 2:2007
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda / Amendments
PublishedISO/IEC 10118-2:2010/Cor 1:2011
-
00
Got a question?
Check out our FAQs
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)