BS ISO/IEC 10118-3:2018 – TC:2020 Edition
$280.87
Tracked Changes. IT Security techniques. Hash-functions – Dedicated hash-functions
Published By | Publication Date | Number of Pages |
BSI | 2020 | 0 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
471 | undefined |
478 | Foreword |
479 | 1 Scope 2 Normative references 3 Terms and definitions |
480 | 4 Symbols 4.1 Symbols specified in ISO/IEC 10118‑1 4.2 Symbols specific to this document |
482 | 5 Requirements 6 Models for dedicated hash-functions 6.1 Use of models 6.2 Round-function model |
483 | 6.3 Sponge model |
484 | 7 Dedicated Hash-Function 1 (RIPEMD-160) 7.1 General |
485 | 7.2 Parameters, functions and constants 7.2.1 Parameters 7.2.2 Byte ordering convention 7.2.3 Functions |
486 | 7.2.4 Constants |
488 | 7.2.5 Initializing value 7.3 Padding method |
489 | 7.4 Description of the round-function |
490 | 8 Dedicated Hash-Function 2 (RIPEMD-128) 8.1 General 8.2 Parameters, functions and constants 8.2.1 Parameters 8.2.2 Byte ordering convention |
491 | 8.2.3 Functions 8.2.4 Constants 8.2.5 Initializing value 8.3 Padding method 8.4 Description of the round-function |
493 | 9 Dedicated Hash-Function 3 (SHA-1) 9.1 General 9.2 Parameters, functions and constants 9.2.1 Parameters 9.2.2 Byte ordering convention 9.2.3 Functions 9.2.4 Constants |
494 | 9.2.5 Initializing value 9.3 Padding method 9.4 Description of the round-function |
495 | 10 Dedicated Hash-Function 4 (SHA-256) 10.1 General |
496 | 10.2 Parameters, functions and constants 10.2.1 Parameters 10.2.2 Byte ordering convention 10.2.3 Functions 10.2.4 Constants 10.2.5 Initializing value |
497 | 10.3 Padding method 10.4 Description of the round-function |
498 | 11 Dedicated Hash-Function 5 (SHA-512) 11.1 General 11.2 Parameters, functions and constants 11.2.1 Parameters 11.2.2 Byte ordering convention |
499 | 11.2.3 Functions 11.2.4 Constants |
500 | 11.2.5 Initializing value 11.3 Padding method 11.4 Description of the round-function |
501 | 12 Dedicated Hash-Function 6 (SHA-384) 12.1 General |
502 | 12.2 Parameters, functions and constants 12.2.1 Parameters 12.2.2 Byte ordering convention 12.2.3 Functions 12.2.4 Constants 12.2.5 Initializing value 12.3 Padding method 12.4 Description of the round-function |
503 | 13 Dedicated Hash-Function 7 (WHIRLPOOL) 13.1 General 13.2 Parameters, functions and constants 13.2.1 Parameters 13.2.2 Byte ordering convention 13.2.3 Functions |
505 | 13.2.4 Constants 13.2.5 Initializing value 13.3 Padding method 13.4 Description of the round-function |
506 | 14 Dedicated Hash-Function 8 (SHA-224) 14.1 General 14.2 Parameters, functions and constants 14.2.1 Parameters 14.2.2 Byte ordering convention 14.2.3 Functions |
507 | 14.2.4 Constants 14.2.5 Initializing value 14.3 Padding method 14.4 Description of the round-function 15 Dedicated Hash-Function 9 (SHA-512/224) 15.1 General 15.2 Parameters, functions and constants 15.2.1 Parameters 15.2.2 Byte ordering convention |
508 | 15.2.3 Functions 15.2.4 Constants 15.2.5 Initializing value 15.3 Padding method 15.4 Description of the round-function 16 Dedicated Hash-Function 10 (SHA-512/256) 16.1 General 16.2 Parameters, functions and constants 16.2.1 Parameters |
509 | 16.2.2 Byte ordering convention 16.2.3 Functions 16.2.4 Constants 16.2.5 Initializing value 16.3 Padding method 16.4 Description of the round-function 17 Dedicated Hash-Function 11 (STREEBOG-512) 17.1 General |
510 | 17.2 Parameters, functions and constants 17.2.1 Parameters 17.2.2 Byte ordering convention 17.2.3 Functions |
512 | 17.2.4 Constants 17.2.5 Initializing value 17.3 Padding method |
513 | 17.4 Description of the round-function |
514 | 18 Dedicated Hash-Function 12 (STREEBOG-256) 18.1 General 18.2 Parameters, functions and constants 18.2.1 Parameters 18.2.2 Byte ordering convention 18.2.3 Functions 18.2.4 Constants 18.2.5 Initializing value |
515 | 18.3 Padding method 18.4 Description of the round-function 19 Dedicated Hash-Function 13 (SHA3-224) 19.1 General 19.2 Parameters, functions and constants 19.2.1 Parameters 19.2.2 Byte ordering convention 19.2.3 Functions |
521 | 19.3 Padding method 19.4 Description of a round-function |
522 | 19.5 Output transformation 20 Dedicated Hash-Function 14 (SHA3-256) 20.1 General 20.2 Parameters, functions and constants 20.2.1 Parameters 20.2.2 Byte ordering convention 20.2.3 Functions 20.2.4 Constants 20.2.5 Initializing value |
523 | 20.3 Padding method 20.4 Description of round-function 20.5 Output transformation 21 Dedicated Hash-Function 15 (SHA3-384) 21.1 General 21.2 Parameters, functions and constants 21.2.1 Parameters 21.2.2 Byte ordering convention |
524 | 21.2.3 Functions 21.2.4 Constants 21.2.5 Initializing value 21.3 Padding method 21.4 Description of round-function 21.5 Output transformation 22 Dedicated Hash-Function 16 (SHA3-512) 22.1 General 22.2 Parameters, functions and constants 22.2.1 Parameters 22.2.2 Byte ordering convention |
525 | 22.2.3 Functions 22.2.4 Constants 22.2.5 Initializing value 22.3 Padding method 22.4 Description of round-function 22.5 Output transformation 23 Dedicated Hash-Function 17 (SM3) 23.1 General |
526 | 23.2 Parameters, functions and constants 23.2.1 Parameters 23.2.2 Byte ordering convention 23.2.3 Functions 23.2.4 Constants 23.2.5 Initializing value |
527 | 23.3 Padding method 23.4 Description of the round-function |
529 | Annex A (normative) Object identifiers |
533 | Annex B (informative) Numerical examples |
723 | Annex C (informative) SHA-3 Extendable-Output Functions |