Your cart is currently empty!

ISO 10118:1998
ISO 10118:1998 Information technology – Security techniques – Hash-functions – Part 4: Hash-functions using modular arithmetic
CDN $233.00
Description
This part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-functions,
which are believed to be collision-resistant, compress messages of arbitrary but limited length to a hash-code
whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,
the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identification
scheme).
The hash-functions specified in this part of ISO/IEC 10118, known as MASH-1 and MASH-2 (Modular Arithmetic
Secure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficient
length are already available. The two hash-functions differ only in the exponent used in the round-function.
Edition
1
Published Date
1998-12-20
Status
PUBLISHED
Pages
23
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
This part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-functions,
which are believed to be collision-resistant, compress messages of arbitrary but limited length to a hash-code
whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,
the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identification
scheme).
The hash-functions specified in this part of ISO/IEC 10118, known as MASH-1 and MASH-2 (Modular Arithmetic
Secure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficient
length are already available. The two hash-functions differ only in the exponent used in the round-function.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 27006:2024 Information security, cybersecurity and privacy protection – Requirements for bodies providing audit and certification of information security management systems – Part 1: General
0 out of 5CDN $312.00 Add to cart -
ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
0 out of 5CDN $273.00 Add to cart -
ISO 27022:2021 Information technology – Guidance on information security management system processes
0 out of 5CDN $312.00 Add to cart -
ISO 27001:2024 Information security, cybersecurity and privacy protection – Information security management systems – Requirements – Amendment 1: Climate action changes
0 out of 5CDN $0.00 Add to cart