ISO/IEC 10118-1:2016
Current
The latest, up-to-date edition.
Information technology — Security techniques — Hash-functions — Part 1: General
English
14-10-2016
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature mechanism, and
- committing the user to a given string of bits without revealing this string.
NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‑2 [1].
ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DevelopmentNote |
NEW CHILD AMD 1 2021 IS NOW ADDED
|
| DocumentType |
Standard
|
| Pages |
12
|
| ProductNote |
NEW CHILD AMD 1 2021 IS NOW ADDED
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| BS ISO/IEC 10118-1:2016 | Identical |
| NEN ISO/IEC 10118-1 : 2016 | Identical |
| INCITS/ISO/IEC 10118-1:2016(R2019) | Identical |
| INCITS/ISO/IEC 10118-1 : 2016(R2024) | Identical |
| INCITS/ISO/IEC 10118-1:2016(R2024) | Identical |
| INCITS/ISO/IEC 10118-1 : 2000 : R2005 | Identical |
| INCITS/ISO/IEC 10118-1 : 2000 | Identical |
| ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
| BS ISO/IEC 10118-4 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
| 15/30288056 DC : 0 | BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
| BS ISO 17068:2017 | Information and documentation. Trusted third party repository for digital records |
| BS ISO/IEC 29192-5:2016 | Information technology. Security techniques. Lightweight cryptography Hash-functions |
| 07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
| ISO 17068:2017 | Information and documentation — Trusted third party repository for digital records |
| 02/652465 DC : DRAFT MAY 2002 | ISO/IEC CD 10118-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
| INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
| INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
| BS EN ISO/IEC 7816/4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE |
| INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| BS ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
| INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| DIN ISO 9735-10:2015-05 | Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 2) - Part 10: Syntax service directories (ISO 9735-10:2014) |
| BS ISO/IEC 18033-4 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
| ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
| EN ISO 24534-4:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
| ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services |
| CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI) - TTI messages via cellular networks - Part 5: Internal services |
| CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
| 08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
| 09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| INCITS/ISO/IEC 10118-2 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
| PD CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
| 11/30228418 DC : DRAFT JUNE 2011 | BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
| BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
| 04/30105372 DC : DRAFT DEC 2004 | ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
| BS EN ISO 24534-4:2010+A1:2019 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
| PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| BS ISO/IEC 10118-2:2010 | Information technology. Security techniques. Hash-functions Hash-functions using an n-bit block cipher |
| I.S. EN ISO/IEC 7816-4:1998 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
| ISO/IEC 13888-1:2009 | Information technology — Security techniques — Non-repudiation — Part 1: General |
| ISO 15668:1999 | Banking — Secure file transfer (retail) |
| BS EN 50159-2:2001 | Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
| 08/30135059 DC : 0 | ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
| 15/30311322 DC : 0 | BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS |
| ISO/IEC 29167-17:2015 | Information technology — Automatic identification and data capture techniques — Part 17: Crypto suite cryptoGPS security services for air interface communications |
| BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
| 07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
| 12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO 15668:1999 | Banking. Secure file transfer (retail) |
| 08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
| 07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
| ISO/IEC 29192-5:2016 | Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions |
| ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| BS ISO/IEC 13888-1:2009 | Information technology. Security techniques. Non-repudiation General |
| BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
| BS ISO/IEC 10116:2017 | Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher |
| ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
| ISO 24534-4:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| S.R. CEN ISO TS 24534-4:2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
| CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| 09/30169518 DC : 0 | BS ISO/IEC 10118-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
| 16/30337318 DC : 0 | BS ISO/IEC 10118-3 - INFORMATION TECHNOLOGIES - SECURITY TECHNIQUES - HASHFUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
| INCITS/ISO/IEC 10118-3 : 2003 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
| DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
| BS ISO/IEC 10118-3 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
| BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
| DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
| DD CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
| INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
| 07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
| 08/30195403 DC : 0 | BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
| 03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
| INCITS/ISO/IEC 10116 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
| I.S. CWA 14171:2004 | GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
| ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
| INCITS/ISO/IEC 18033-4 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
| IEEE 1377-2012 | IEEE Standard for Utility Industry Metering Communication Protocol Application Layer (End Device Data Tables) |
| I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
| ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
| I.S. EN ISO 24534-4:2010/A1:2019 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
| ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
| IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
| EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
| EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
| BS ISO/TR 19121:2000 | Geographic information. Imagery and gridded data |
| NF EN ISO/IEC 7816-4 : 1996 | INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
| INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
| 06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
| PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
| DD CEN/TS 14821-5:2003 | Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
| BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
| 09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
| 07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
| 07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| ISO 11568-6:1998 | Banking — Key management (retail) — Part 6: Key management schemes |
| INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| I.S. EN 50159-2:2001 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
| INCITS/ISO/IEC 10118-4 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
| ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
| S.R. CEN/TS 419261:2015 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
| EN 50159-2 : 2001 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
| CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
| UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
| UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| UNE-EN ISO 24534-4:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
| INCITS/ISO 22739 : 2024(2024) | Blockchain and distributed ledger technologies - Vocabulary |
| INCITS/ISO/IEC 29192-5:2016(R2019) | Information technology -- Security techniques - Lightweight cryptography -- Part 5: Hashfunctions |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.