Information technology — Security techniques — Hash-functions — Part 1: General (ISO/IEC 10118-1:2016)
ISO/ IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision ofauthentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable(but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They canbe used for— reducing a message to a short imprint for input to a digital signature mechanism, and— committing the user to a given string of bits without revealing this string.NOTE The hash-functions specified in ISO/ IEC 10118 (all parts) do not involve the use of secret keys.However, these hash-functions may be used, in conjunction with secret keys, to build message authenticationcodes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity.Techniques for computing a MAC using a hash-function are specified in ISO/ IEC 9797-2 [1].This document contains definitions, symbols, abbreviations and requirements that are common to allthe other parts of ISO/ IEC 10118. The criteria used to select the algorithms specified in subsequentparts of ISO/ IEC 10118 are defined in Annex B of this document.
View in