• Shopping Cart
    There are no items in your cart

BS ISO/IEC 9797-1:2011

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher

Available format(s)

Hardcopy , PDF

Withdrawn date

31-08-2023

Language(s)

English

Published date

31-03-2011

€303.84
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 Model for MAC algorithms
7 MAC algorithms
Annex A (normative) - Object identifiers
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the MAC
        algorithms
Annex D (informative) - A comparison with previous MAC
        algorithm standards
Bibliography

Describes six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

Committee
IST/33/2
DevelopmentNote
Supersedes 08/30192697 DC. (04/2011)
DocumentType
Standard
Pages
52
PublisherName
British Standards Institution
Status
Withdrawn
Supersedes

This part of ISO/IEC9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

This part of ISO/IEC9797 can be applied to the security services of any security architecture, process, or application.

Key management mechanisms are outside the scope of this part of ISO/IEC9797.

This part of ISO/IEC9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC9797 to previous standards is explained.

Standards Relationship
ISO/IEC 9797-1:2011 Identical

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ANSI X9.19 : 1996 FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
ANSI X9.9 : 86(R1994) FINANCIAL INSTITUTION MESSAGE AUTHENTICATION (WHOLESALE)
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.