Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

ISO/IEC 10118-1:2016

Information technology — Security techniques — Hash-functions — Part 1: General

Oct 14, 2016

General information

90.93     May 19, 2022

ISO/IEC

ISO/IEC JTC 1/SC 27

International Standard

35.030  

English  

Buying

Published

Language in which you want to receive the document.

Scope

ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‑2 [1].
ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC 10118-1:2000

NOW

PUBLISHED
ISO/IEC 10118-1:2016
90.93 Standard confirmed
May 19, 2022

CORRIGENDA / AMENDMENTS

PUBLISHED
ISO/IEC 10118-1:2016/Amd 1:2021

National adoptions

Information technology — Security techniques — Hash-functions — Part 1: General

90.93   Standard confirmed

I224 more