-
-
Available Formats
- Options
- Availability
- Priced From ( in USD )
-
Available Formats
-
- Immediate download
- $194.00
- Add to Cart
-
- Printed Edition
- Ships in 1-2 business days
- $194.00
- Add to Cart
Customers Who Bought This Also Bought
-
ISO/IEC 15419:2009
Priced From $166.00 -
ISO/IEC 15415:2011
Priced From $223.00 -
ISO/IEC TR 14496-7:2004
Priced From $194.00 -
ISO/IEC 19762:2016
Priced From $278.00
About This Item
Full Description
ISO/IEC 10118-2:2010 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Block ciphers are specified in ISO/IEC 18033-3.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in ISO/IEC 10118-2:2010 conform to the general model specified in ISO/IEC 10118-1.
Document History
-
ISO/IEC 10118-2:2010
viewing
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher- Most Recent
-
ISO/IEC 10118-2 Ed. 1.0 en CORR2:2007
Corrigendum 2 - Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher -- Historical Version
-
ISO/IEC 10118-2:2000
Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher- Historical Version
Amendments, rulings, supplements, and errata
-
ISO/IEC 10118-2/Cor1:2011
Download
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher algorithm - Corrigendum 1 -
ISO/IEC 10118-2 Ed. 1.0 en CORR1:2011
Download
Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher -