Shopping Cart

No products in the cart.

BS ISO/IEC 10118-3:2018 – TC:2020 Edition

$280.87

Tracked Changes. IT Security techniques. Hash-functions – Dedicated hash-functions

Published By Publication Date Number of Pages
BSI 2020 0
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
471 undefined
478 Foreword
479 1 Scope
2 Normative references
3 Terms and definitions
480 4 Symbols
4.1 Symbols specified in ISO/IEC 10118‑1
4.2 Symbols specific to this document
482 5 Requirements
6 Models for dedicated hash-functions
6.1 Use of models
6.2 Round-function model
483 6.3 Sponge model
484 7 Dedicated Hash-Function 1 (RIPEMD-160)
7.1 General
485 7.2 Parameters, functions and constants
7.2.1 Parameters
7.2.2 Byte ordering convention
7.2.3 Functions
486 7.2.4 Constants
488 7.2.5 Initializing value
7.3 Padding method
489 7.4 Description of the round-function
490 8 Dedicated Hash-Function 2 (RIPEMD-128)
8.1 General
8.2 Parameters, functions and constants
8.2.1 Parameters
8.2.2 Byte ordering convention
491 8.2.3 Functions
8.2.4 Constants
8.2.5 Initializing value
8.3 Padding method
8.4 Description of the round-function
493 9 Dedicated Hash-Function 3 (SHA-1)
9.1 General
9.2 Parameters, functions and constants
9.2.1 Parameters
9.2.2 Byte ordering convention
9.2.3 Functions
9.2.4 Constants
494 9.2.5 Initializing value
9.3 Padding method
9.4 Description of the round-function
495 10 Dedicated Hash-Function 4 (SHA-256)
10.1 General
496 10.2 Parameters, functions and constants
10.2.1 Parameters
10.2.2 Byte ordering convention
10.2.3 Functions
10.2.4 Constants
10.2.5 Initializing value
497 10.3 Padding method
10.4 Description of the round-function
498 11 Dedicated Hash-Function 5 (SHA-512)
11.1 General
11.2 Parameters, functions and constants
11.2.1 Parameters
11.2.2 Byte ordering convention
499 11.2.3 Functions
11.2.4 Constants
500 11.2.5 Initializing value
11.3 Padding method
11.4 Description of the round-function
501 12 Dedicated Hash-Function 6 (SHA-384)
12.1 General
502 12.2 Parameters, functions and constants
12.2.1 Parameters
12.2.2 Byte ordering convention
12.2.3 Functions
12.2.4 Constants
12.2.5 Initializing value
12.3 Padding method
12.4 Description of the round-function
503 13 Dedicated Hash-Function 7 (WHIRLPOOL)
13.1 General
13.2 Parameters, functions and constants
13.2.1 Parameters
13.2.2 Byte ordering convention
13.2.3 Functions
505 13.2.4 Constants
13.2.5 Initializing value
13.3 Padding method
13.4 Description of the round-function
506 14 Dedicated Hash-Function 8 (SHA-224)
14.1 General
14.2 Parameters, functions and constants
14.2.1 Parameters
14.2.2 Byte ordering convention
14.2.3 Functions
507 14.2.4 Constants
14.2.5 Initializing value
14.3 Padding method
14.4 Description of the round-function
15 Dedicated Hash-Function 9 (SHA-512/224)
15.1 General
15.2 Parameters, functions and constants
15.2.1 Parameters
15.2.2 Byte ordering convention
508 15.2.3 Functions
15.2.4 Constants
15.2.5 Initializing value
15.3 Padding method
15.4 Description of the round-function
16 Dedicated Hash-Function 10 (SHA-512/256)
16.1 General
16.2 Parameters, functions and constants
16.2.1 Parameters
509 16.2.2 Byte ordering convention
16.2.3 Functions
16.2.4 Constants
16.2.5 Initializing value
16.3 Padding method
16.4 Description of the round-function
17 Dedicated Hash-Function 11 (STREEBOG-512)
17.1 General
510 17.2 Parameters, functions and constants
17.2.1 Parameters
17.2.2 Byte ordering convention
17.2.3 Functions
512 17.2.4 Constants
17.2.5 Initializing value
17.3 Padding method
513 17.4 Description of the round-function
514 18 Dedicated Hash-Function 12 (STREEBOG-256)
18.1 General
18.2 Parameters, functions and constants
18.2.1 Parameters
18.2.2 Byte ordering convention
18.2.3 Functions
18.2.4 Constants
18.2.5 Initializing value
515 18.3 Padding method
18.4 Description of the round-function
19 Dedicated Hash-Function 13 (SHA3-224)
19.1 General
19.2 Parameters, functions and constants
19.2.1 Parameters
19.2.2 Byte ordering convention
19.2.3 Functions
521 19.3 Padding method
19.4 Description of a round-function
522 19.5 Output transformation
20 Dedicated Hash-Function 14 (SHA3-256)
20.1 General
20.2 Parameters, functions and constants
20.2.1 Parameters
20.2.2 Byte ordering convention
20.2.3 Functions
20.2.4 Constants
20.2.5 Initializing value
523 20.3 Padding method
20.4 Description of round-function
20.5 Output transformation
21 Dedicated Hash-Function 15 (SHA3-384)
21.1 General
21.2 Parameters, functions and constants
21.2.1 Parameters
21.2.2 Byte ordering convention
524 21.2.3 Functions
21.2.4 Constants
21.2.5 Initializing value
21.3 Padding method
21.4 Description of round-function
21.5 Output transformation
22 Dedicated Hash-Function 16 (SHA3-512)
22.1 General
22.2 Parameters, functions and constants
22.2.1 Parameters
22.2.2 Byte ordering convention
525 22.2.3 Functions
22.2.4 Constants
22.2.5 Initializing value
22.3 Padding method
22.4 Description of round-function
22.5 Output transformation
23 Dedicated Hash-Function 17 (SM3)
23.1 General
526 23.2 Parameters, functions and constants
23.2.1 Parameters
23.2.2 Byte ordering convention
23.2.3 Functions
23.2.4 Constants
23.2.5 Initializing value
527 23.3 Padding method
23.4 Description of the round-function
529 Annex A (normative) Object identifiers
533 Annex B (informative) Numerical examples
723 Annex C (informative) SHA-3 Extendable-Output Functions
BS ISO/IEC 10118-3:2018 - TC
$280.87