We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
Translate name
STANDARD published on 31.10.2018
Designation standards: ISO/IEC 10118-3-ed.4.0
Publication date standards: 31.10.2018
SKU: NS-940501
The number of pages: 398
Approximate weight : 1225 g (2.70 lbs)
Country: International technical standard
Category: Technical standards ISO
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions. The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated. NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions 1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and they are therefore, only usable for legacy applications. However, for applications where collision resistance is not required, such as in hash-functions as specified in ISO/IEC 9797-2, or in key derivation functions specified in ISO/IEC 11770-6, their use is not deprecated. Numerical examples for dedicated hash-functions specified in this document are given in Annex B as additional information. For information purposes, SHA-3 extendable-output functions are specified in Annex C.
Do you want to be sure about the validity of used regulations?
We offer you a solution so that you could use valid and updated legislative regulations.
Would you like to get more information? Look at this page.
Latest update: 2025-01-10 (Number of items: 2 218 439)
© Copyright 2025 NORMSERVIS s.r.o.