08/30135059 DC : 0
Current
The latest, up-to-date edition.
ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS)
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 Requirements
6 MAC Algorithm 1
6.1 Description of MAC Algorithm 1
6.1.1 Step 1 (key expansion)
6.1.2 Step 2 (modification of the constants and the IV)
6.1.3 Step 3 (hashing operation)
6.1.4 Step 4 (output transformation)
6.1.5 Step 5 (truncation)
6.2 Efficiency
6.3 Computation of the constants
6.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
6.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
6.3.3 Dedicated Hash-Function 3 (SHA-1)
6.3.4 Dedicated Hash-Function 4 (SHA-256)
6.3.5 Dedicated Hash-Function 5 (SHA-512)
6.3.6 Dedicated Hash-Function 6 (SHA-384)
6.3.7 Dedicated Hash-Function 8 (SHA-224)
7 MAC Algorithm 2
7.1 Description of MAC Algorithm 2
7.1.1 Step 1 (key expansion)
7.1.2 Step 2 (hashing operation)
7.1.3 Step 3 (output transformation)
7.1.4 Step 4 (truncation)
7.2 Efficiency
8 MAC Algorithm 3
8.1 Description of MAC Algorithm 3
8.1.1 Step 1 (key expansion)
8.1.2 Step 2 (modification of the constants and the IV)
8.1.3 Step 3 (padding)
8.1.4 Step 4 (application of the round-function)
8.1.5 Step 5 (truncation)
8.2 Efficiency
Annex A (normative) ASN.1 Module
Annex B (informative) Examples
B.1 General
B.2 MAC Algorithm 1
B.2.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.2.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.2.3 Dedicated Hash-Function 3 (SHA-1)
B.2.4 Dedicated Hash-Function 4 (SHA-256)
B.2.5 Dedicated Hash-Function 5 (SHA-512)
B.2.6 Dedicated Hash-Function 6 (SHA-384)
B.2.7 Dedicated Hash-Function 8 (SHA-224)
B.3 MAC Algorithm 2
B.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.3.3 Dedicated Hash-Function 3 (SHA-1)
B.3.4 Dedicated Hash-Function 4 (SHA-256)
B.3.5 Dedicated Hash-Function 5 (SHA-512)
B.3.6 Dedicated Hash-Function 6 (SHA-384)
B.3.7 Dedicated Hash-Function 7 (WHIRLPOOL)
B.3.8 Dedicated Hash-Function 8 (SHA-224)
B.4 MAC Algorithm 3
B.4.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.4.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.4.3 Dedicated Hash-Function 3 (SHA-1)
B.4.4 Dedicated Hash-Function 4 (SHA-256)
B.4.5 Dedicated Hash-Function 5 (SHA-512)
B.4.6 Dedicated Hash-Function 6 (SHA-384)
B.4.7 Dedicated Hash-Function 8 (SHA-224)
Annex C (informative) A Security Analysis of the MAC Algorithms
Bibliography
ISO/IEC 9797-2 (REV)
Committee |
IST/33
|
DocumentType |
Draft
|
Pages |
43
|
PublisherName |
British Standards Institution
|
Status |
Current
|
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 10181-6:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.