IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
Scope:
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-
functions in this document are based on the iterative use of a round-function. Distinct round-functions
are specified, giving rise to distinct dedicated hash-functions.
The use of Dedicated Hash-Functions 1, 2 and 3 in new digital signature implementations is deprecated.
NOTE As a result of their short hash-code length and/or cryptanalytic results, Dedicated Hash-Functions
1, 2 and 3 do not provide a sufficient level of collision resistance for future digital signature applications and
they are therefore, only usable for legacy applications. However, for applications where collision resistance is
not required, such as in hash-functions as specified in ISO/IEC 9797-2, or in key derivation functions specified in
ISO/IEC 11770-6, their use is not deprecated.
Numerical examples for dedicated hash-functions specified in this document are given in Annex B as
additional information. For information purposes, SHA-3 extendable-output functions are specified in
Annex C.
Project need:
Note: The information provided above was obtained by the Standards Council of Canada (SCC) and is provided as part of a centralized, transparent notification system for new standards development. The system allows SCC-accredited Standards Development Organizations (SDOs), and members of the public, to be informed of new work in Canadian standards development, and allows SCC-accredited SDOs to identify and resolve potential duplication of standards and effort.
Individual SDOs are responsible for the content and accuracy of the information presented here. The text is presented in the language in which it was provided to SCC.