Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions General
Sponsored link
sklademVydáno: 2021-03-16
BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions General

BS ISO/IEC 10118-1:2016+A1:2021

Information technology. Security techniques. Hash-functions General

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
195.22 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
19.52 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
58.57 €
Anglicky Hardcopy
In stock
195.22 €
Označení normy:BS ISO/IEC 10118-1:2016+A1:2021
Počet stran:20
Vydáno:2021-03-16
ISBN:978 0 539 05583 2
Status:Standard
DESCRIPTION

BS ISO/IEC 10118-1:2016+A1:2021


This standard BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions is classified in these ICS categories:
  • 35.030 IT Security

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

  • reducing a message to a short imprint for input to a digital signature mechanism, and

  • committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‑2[1].

This document contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.