
ISO 10118:1998
ISO 10118:1998 Information technology – Security techniques – Hash-functions – Part 4: Hash-functions using modular arithmetic
CDN $233.00
Description
This part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-functions,
which are believed to be collision-resistant, compress messages of arbitrary but limited length to a hash-code
whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,
the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identification
scheme).
The hash-functions specified in this part of ISO/IEC 10118, known as MASH-1 and MASH-2 (Modular Arithmetic
Secure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficient
length are already available. The two hash-functions differ only in the exponent used in the round-function.
Edition
1
Published Date
1998-12-20
Status
PUBLISHED
Pages
23
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This part of ISO/IEC 10118 specifies two hash-functions which make use of modular arithmetic. These hash-functions,
which are believed to be collision-resistant, compress messages of arbitrary but limited length to a hash-code
whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus,
the hash-code is easily scaled to the input length of any mechanism (e.g., signature algorithm, identification
scheme).
The hash-functions specified in this part of ISO/IEC 10118, known as MASH-1 and MASH-2 (Modular Arithmetic
Secure Hash) are particularly suitable for environments in which implementations of modular arithmetic of sufficient
length are already available. The two hash-functions differ only in the exponent used in the round-function.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 22739:2024 Blockchain and distributed ledger technologies – Vocabulary
CDN $173.00 Add to cart -

ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
CDN $273.00 Add to cart -

ISO 18180:2013 Information technology – Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
CDN $0.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 2: Assessment procedures for the O-TTPS
CDN $312.00 Add to cart







