PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions General
Sponsored link
immediate downloadReleased: 2021-03-16
BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions General

BS ISO/IEC 10118-1:2016+A1:2021

Information technology. Security techniques. Hash-functions General

Format
Availability
Price and currency
English Secure PDF
Immediate download
180.00 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
18.00 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
54.00 EUR
English Hardcopy
In stock
180.00 EUR
Standard number:BS ISO/IEC 10118-1:2016+A1:2021
Pages:20
Released:2021-03-16
ISBN:978 0 539 05583 2
Status:Standard
BS ISO/IEC 10118-1:2016+A1:2021 Information Technology Security Techniques Hash-functions General

BS ISO/IEC 10118-1:2016+A1:2021 Information Technology Security Techniques Hash-functions General

In the rapidly evolving world of information technology, ensuring the security and integrity of data is paramount. The BS ISO/IEC 10118-1:2016+A1:2021 standard is a crucial document that provides comprehensive guidelines on security techniques, specifically focusing on hash-functions. This standard is an essential resource for professionals in the field of IT security, offering a robust framework for implementing secure hash-functions.

Overview of the Standard

The BS ISO/IEC 10118-1:2016+A1:2021 is a part of the ISO/IEC 10118 series, which is dedicated to hash-functions. This particular document serves as a general guide, laying the foundation for understanding and applying hash-functions in various security contexts. Released on March 16, 2021, this standard is the latest update, incorporating amendments that reflect the current state of technology and security needs.

Key Features and Benefits

  • Comprehensive Coverage: With 20 pages of detailed information, this standard provides an in-depth look at hash-functions, ensuring that users have access to all necessary knowledge to implement these techniques effectively.
  • Up-to-date Information: The inclusion of the amendment A1:2021 ensures that the standard reflects the latest advancements and best practices in the field of IT security.
  • Global Recognition: As an ISO/IEC standard, it is recognized and respected worldwide, making it a valuable asset for international organizations and professionals.
  • ISBN: The document is easily identifiable and accessible with its unique ISBN: 978 0 539 05583 2.

Importance of Hash-functions in IT Security

Hash-functions play a critical role in the realm of IT security. They are used to ensure data integrity, authenticate information, and protect sensitive data from unauthorized access. By converting data into a fixed-size string of characters, hash-functions make it nearly impossible to retrieve the original data, thus providing a layer of security that is essential in today's digital landscape.

The BS ISO/IEC 10118-1:2016+A1:2021 standard provides the necessary guidelines to implement these functions effectively, ensuring that data remains secure and tamper-proof. This is particularly important for industries that handle sensitive information, such as finance, healthcare, and government sectors.

Who Should Use This Standard?

This standard is designed for a wide range of professionals and organizations, including:

  • IT Security Professionals: Those responsible for safeguarding data and implementing security protocols will find this standard invaluable.
  • Software Developers: Developers who need to integrate hash-functions into their applications can rely on this standard for guidance.
  • Compliance Officers: Ensuring that an organization meets international security standards is crucial, and this document provides the necessary framework.
  • Academic Researchers: Those studying information security can use this standard as a reference for understanding the principles and applications of hash-functions.

Conclusion

In conclusion, the BS ISO/IEC 10118-1:2016+A1:2021 standard is an essential tool for anyone involved in the field of information technology security. Its comprehensive guidelines on hash-functions provide a solid foundation for implementing effective security measures. By adhering to this standard, organizations can ensure that their data remains secure, maintaining the trust of their clients and stakeholders.

Whether you are an IT professional, a software developer, or a compliance officer, this standard offers the insights and guidance needed to navigate the complex world of data security. Embrace the power of hash-functions and protect your data with the confidence that comes from following internationally recognized standards.

DESCRIPTION

BS ISO/IEC 10118-1:2016+A1:2021


This standard BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions is classified in these ICS categories:
  • 35.030 IT Security

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for

  • reducing a message to a short imprint for input to a digital signature mechanism, and

  • committing the user to a given string of bits without revealing this string.

NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797‑2[1].

This document contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document.