Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $267.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ISO/IEC 10118-3:2004 specifies the following seven dedicated hash-functions, i.e. specially-designed hash-functions:

  • the first hash-function (RIPEMD-160) in Clause 7 provides hash-codes of lengths up to 160 bits;
  • the second hash-function (RIPEMD-128) in Clause 8 provides hash-codes of lengths up to 128 bits;
  • the third hash-function (SHA-1) in Clause 9 provides hash-codes of lengths up to 160 bits;
  • the fourth hash-function (SHA-256) in Clause 10 provides hash-codes of lengths up to 256 bits;
  • the fifth hash-function (SHA-512) in Clause 11 provides hash-codes of lengths up to 512 bits;
  • the sixth hash-function (SHA-384) in Clause 12 provides hash-codes of a fixed length, 384 bits; and
  • the seventh hash-function (WHIRLPOOL) in Clause 13 provides hash-codes of lengths up to 512 bits.

For each of these dedicated hash-functions, ISO/IEC 10118-3:2004 specifies a round-function that consists of a sequence of sub-functions, a padding method, initializing values, parameters, constants, and an object identifier as normative information, and also specifies several computation examples as informative information.

 

Document History

  1. ISO/IEC 10118-3:2018


    IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions

    • Most Recent
  2. ISO/IEC 10118-3 Ed. 1.0 en CORR1:2011


    Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions -

    • Historical Version
  3. ISO/IEC 10118-3:2004

    👀 currently
    viewing


    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 10118-3/Cor1:2011

    Free
    Download


    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Corrigendum 1

  2. ISO/IEC 10118-3/Amd1:2006


    Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Amendment 1: Dedicated Hash-Function 8 (SHA-224)