IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions (ISO/IEC 10118-3:2018)
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functionsare specified, giving rise to distinct dedicated hash-functions.The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.NOTE As a result of their short hash-code length and/ or cryptanalytic results, Dedicated Hash-Functions1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications andthey are therefore, only usable for legacy applications. However, for applications where collision resistance isnot required, such as in hash-functions as specified in ISO/ IEC 9797-2, or in key derivation functions specified inISO/ IEC 11770-6, their use is not deprecated.Numerical examples for dedicated hash-functions specified in this document are given in Annex B asadditional information. For information purposes, SHA-3 extendable-output functions are specified inAnnex C.
View in