• 08/30135059 DC : 0

    Current The latest, up-to-date edition.

    ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols (and abbreviated terms)
    5 Requirements
    6 MAC Algorithm 1
      6.1 Description of MAC Algorithm 1
          6.1.1 Step 1 (key expansion)
          6.1.2 Step 2 (modification of the constants and the IV)
          6.1.3 Step 3 (hashing operation)
          6.1.4 Step 4 (output transformation)
          6.1.5 Step 5 (truncation)
      6.2 Efficiency
      6.3 Computation of the constants
          6.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
          6.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
          6.3.3 Dedicated Hash-Function 3 (SHA-1)
          6.3.4 Dedicated Hash-Function 4 (SHA-256)
          6.3.5 Dedicated Hash-Function 5 (SHA-512)
          6.3.6 Dedicated Hash-Function 6 (SHA-384)
          6.3.7 Dedicated Hash-Function 8 (SHA-224)
    7 MAC Algorithm 2
      7.1 Description of MAC Algorithm 2
          7.1.1 Step 1 (key expansion)
          7.1.2 Step 2 (hashing operation)
          7.1.3 Step 3 (output transformation)
          7.1.4 Step 4 (truncation)
      7.2 Efficiency
    8 MAC Algorithm 3
      8.1 Description of MAC Algorithm 3
          8.1.1 Step 1 (key expansion)
          8.1.2 Step 2 (modification of the constants and the IV)
          8.1.3 Step 3 (padding)
          8.1.4 Step 4 (application of the round-function)
          8.1.5 Step 5 (truncation)
      8.2 Efficiency
    Annex A (normative) ASN.1 Module
    Annex B (informative) Examples
          B.1 General
          B.2 MAC Algorithm 1
              B.2.1 Dedicated Hash-Function 1 (RIPEMD-160)
              B.2.2 Dedicated Hash-Function 2 (RIPEMD-128)
              B.2.3 Dedicated Hash-Function 3 (SHA-1)
              B.2.4 Dedicated Hash-Function 4 (SHA-256)
              B.2.5 Dedicated Hash-Function 5 (SHA-512)
              B.2.6 Dedicated Hash-Function 6 (SHA-384)
              B.2.7 Dedicated Hash-Function 8 (SHA-224)
          B.3 MAC Algorithm 2
              B.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
              B.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
              B.3.3 Dedicated Hash-Function 3 (SHA-1)
              B.3.4 Dedicated Hash-Function 4 (SHA-256)
              B.3.5 Dedicated Hash-Function 5 (SHA-512)
              B.3.6 Dedicated Hash-Function 6 (SHA-384)
              B.3.7 Dedicated Hash-Function 7 (WHIRLPOOL)
              B.3.8 Dedicated Hash-Function 8 (SHA-224)
          B.4 MAC Algorithm 3
              B.4.1 Dedicated Hash-Function 1 (RIPEMD-160)
              B.4.2 Dedicated Hash-Function 2 (RIPEMD-128)
              B.4.3 Dedicated Hash-Function 3 (SHA-1)
              B.4.4 Dedicated Hash-Function 4 (SHA-256)
              B.4.5 Dedicated Hash-Function 5 (SHA-512)
              B.4.6 Dedicated Hash-Function 6 (SHA-384)
              B.4.7 Dedicated Hash-Function 8 (SHA-224)
    Annex C (informative) A Security Analysis of the MAC Algorithms
    Bibliography

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee IST/33
    Document Type Draft
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective