REGISTER

FR
Search
×
FR

Placeholder headline

This is just a placeholder headline

API SPEC 14L: Lock Mandrels and Landing Nipples : Reaffirmed

$

273

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 20F: Corrosion Resistant Bolting for Use in the Petroleum and Natural Gas Industries : Reaffirmed

$

169

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 5NCL Nickel Content Limits for API 5CT Sour Service Products

$

149

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 19ICD: Inflow Control Devices : Reaffirmed

$

189

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 23.2: Reconciliation of Liquid Tank Car(s) Quantities : Reaffirmed

$

218

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 16A: Specification for Drill-through Equipment

$

322

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-2: Field Testing Oil-based Drilling Fluids wA1

$

388

BUY NOW

ISO 10118:2018

ISO 10118:2018 IT Security techniques – Hash-functions – Part 3: Dedicated hash-functions

CDN $390.00

SKU: 64896142cea7 Category:

Description

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.

NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797‚Äë2, or in key derivation functions specified in ISO/IEC 11770‚Äë6, their use is not deprecated.

Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.

Edition

4

Published Date

2018-10-31

Status

PUBLISHED

Pages

398

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.

NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797‚Äë2, or in key derivation functions specified in ISO/IEC 11770‚Äë6, their use is not deprecated.

Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.

Previous Editions

Can’t find what you are looking for?

Please contact us at: