ISO/IEC 10118-2:2010
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher

Standard No.
ISO/IEC 10118-2:2010
Release Date
2010
Published By
International Organization for Standardization (ISO)
Status
Replace By
ISO/IEC 10118-2:2010/Cor 1:2011
Latest
ISO/IEC 10118-2:2010/Cor 1:2011
Scope
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.

ISO/IEC 10118-2:2010 history

  • 2011 ISO/IEC 10118-2:2010/Cor 1:2011 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher; Technical Corrigendum 1
  • 2010 ISO/IEC 10118-2:2010 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
  • 2007 ISO/IEC 10118-2:2000/Cor 2:2007 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher; Technical Corrigendum 2
  • 2006 ISO/IEC 10118-2:2000/Cor 1:2006 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher; Technical Corrigendum 1
  • 2000 ISO/IEC 10118-2:2000 Information technology - Security techniques; Hash-functions - Part 2: Hash-functions using an n-bit block cipher
  • 1994 ISO/IEC 10118-2:1994 Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher



Copyright ©2024 All Rights Reserved