CAN/CSA-ISO/IEC 10118-2:12 (R2021)
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15)
détails du produit
CSA Preface
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).
This Standard supersedes CAN/CSA-ISO/IEC 10118-2-02 (adoption of ISO/IEC 10118-2:2000, second edition, 2000-12-15).
At the time of publication, ISO/IEC 10118-2:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC.
This International Standard was reviewed by the CSA TCIT under the jurisdiction of the Strategic Steering Committee on Information Technology and deemed acceptable for use in Canada. From time to time, ISO/IEC may publish addenda, corrigenda, etc. The CSA TCIT will review these documents for approval and publication. For a listing, refer to the CSA Information Products catalogue or CSA Info Update or contact a CSA Sales representative. This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada.
Scope
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.
An update to this product is available.
To receive notifications when an amendment, new edition or update is available to your standard no matter how you purchased it, please register on the Standards Update Service. After registering, enter the List ID for the relevant standard. The List ID can be found in the “CSA Standards Update” section within the first few pages of the standard you’ve purchased. Once notified, you can then update your standard accordingly.
PDF Format Purchased from the CSA Store
If you have purchased or subscribed to a standard from the CSA Store in PDF format, login to your CSA OnDemandTM account to access the updated PDF.
Paper Format Purchased or Purchased from Reseller
If you have purchased a paper copy of the standard from the CSA Store or purchased a standard in paper or PDF format from one of our resellers, login to the Standards Update Service to download the updates in PDF format.
eBook Format Purchased
If you have purchased a standard in eBook format, login to the CSA Reader App to download the updated version of the standard.