Over deze norm
||Informatiebeveiliging, Cyber security en Privacy
Specifies two hash-functions which make use of modular arithmetic. These hash-functions, which are believed to be colission-resistant, compress messages of arbitrary but limited length to a hash-code whose length is determined by the length of the prime number used in the reduction-function defined in 7.3. Thus, the hash-code is easily scaled to the input length of any mechanism (e.g. signature algorithm, identification scheme).