Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

ISO/IEC 10118-3:2004

Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions

Feb 24, 2004
95.99   Withdrawal of Standard   Oct 31, 2018

General information

95.99     Oct 31, 2018

ISO/IEC

ISO/IEC JTC 1/SC 27

International Standard

35.030  

English  

Buying

Withdrawn

Language in which you want to receive the document.

Scope

ISO/IEC 10118-3:2004 specifies the following seven dedicated hash-functions, i.e. specially-designed hash-functions:
the first hash-function (RIPEMD-160) in Clause 7 provides hash-codes of lengths up to 160 bits; the second hash-function (RIPEMD-128) in Clause 8 provides hash-codes of lengths up to 128 bits; the third hash-function (SHA-1) in Clause 9 provides hash-codes of lengths up to 160 bits;the fourth hash-function (SHA-256) in Clause 10 provides hash-codes of lengths up to 256 bits; the fifth hash-function (SHA-512) in Clause 11 provides hash-codes of lengths up to 512 bits;the sixth hash-function (SHA-384) in Clause 12 provides hash-codes of a fixed length, 384 bits; andthe seventh hash-function (WHIRLPOOL) in Clause 13 provides hash-codes of lengths up to 512 bits.
For each of these dedicated hash-functions, ISO/IEC 10118-3:2004 specifies a round-function that consists of a sequence of sub-functions, a padding method, initializing values, parameters, constants, and an object identifier as normative information, and also specifies several computation examples as informative information.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 10118-3:2003

NOW

WITHDRAWN
ISO/IEC 10118-3:2004
95.99 Withdrawal of Standard
Oct 31, 2018

CORRIGENDA / AMENDMENTS

WITHDRAWN
ISO/IEC 10118-3:2004/Amd 1:2006

WITHDRAWN
ISO/IEC 10118-3:2004/Cor 1:2011

REVISED BY

PUBLISHED
ISO/IEC 10118-3:2018

National adoptions

Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)

95.99   Withdrawal of Standard

I224 more