Foreword
0 Introduction
1 Scope
2 Normative References
3 Definitions
4 Procedures For Message Authentication
4.1 Authentication Keys
4.2 Authentication Elements
4.3 MAC Length
4.4 MAC Generation
4.5 Placement of MAC
5 Verification of the MAC
6 Approval Procedure For Authentication Algorithms
Annex A (normative) Algorithms Approved For Calculation of MAC
For Authentication of Retail Messages
Annex B (normative) Procedure For the Review of Alternative
Authentication Algorithms
Annex C (normative) Procedure To Prevent Exhaustive Key
Determination
Annex D (informative) Guidance On the Selection of Authentication
Elements
Annex E (informative) Protection Against Duplication and Loss
Annex F (informative) Pseudo-random Key Generator
Annex G (informative) Bibliography
Annex H (informative) General Tutorial Information
Annex I (informative) MAC Computation Examples