Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15)
Formats Available:
Online,Print
Receive a printed paperback book
Shipped via Canada Post
Receive a printed binder(s)
Shipped via Canada Post
Receive a printed hardcover book
Shipped via Canada Post
Receive access to an electronic copy viewable in a web browser or the Orderline Reader app (Click here to view a demo)
Orderline Reader app available for Windows, Mac, Android, and iOS (Click here to download)
Offline access via Orderline Reader app
Reflowable layout suitable for viewing on any device Orderline Reader app
Font-size controls
Text to speech
Built-in search feature
Google and Wikipedia lookup
Ability to add custom highlights, bookmarks, and notes
Can be registered on up to 3 personal devices total (example: computer, laptop, phone)
Receive access to an online PDF copy viewable in a web browser
Offline access via bookmark to a cached web page
Single user access on up to 3 devices
All online copies are watermarked with your license information
Receive access to an online course viewable in a web browser
Receive access to an online course viewable in a web browser
Receive access to an interactive online copy viewable in a web browser (Click here to view a demo)
Searchable
Printable
Expandable images
Drop-down definitions
Links
Receive access to an online webinar hosted through Zoom
Product Overview
CAN/CSA-ISO/IEC 10118-2:12 (R2016)
CSA Group
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15)
Total
As low as$128.00
More About This Product
Description
Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 10118-2-02 (adoption of ISO/IEC 10118-2:2000, second edition, 2000-12-15). At the time of publication, ISO/IEC 10118-2:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.
Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 10118-2-02 (adoption of ISO/IEC 10118-2:2000, second edition, 2000-12-15). At the time of publication, ISO/IEC 10118-2:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n. All four of the hash-functions specified in this part of ISO/IEC 10118 conform to the general model specified in ISO/IEC 10118-1.