• Shopping Cart
    There are no items in your cart

BS ISO/IEC 9797-3:2011

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function

Available format(s)

Hardcopy , PDF

Withdrawn date

01-04-2020

Language(s)

English

Published date

31-01-2012

€254.76
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General model
6 Mechanisms
Annex A (normative) - Object Identifiers
Annex B (informative) - Test Vectors
Annex C (informative) - Security Information
Bibliography

Describes the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4: 1. UMAC; 2. Badger; 3. Poly1305-AES; 4. GMAC.

Committee
IST/33/2
DevelopmentNote
Supersedes 10/30135070 DC. (01/2012)
DocumentType
Standard
Pages
36
PublisherName
British Standards Institution
Status
Withdrawn
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9797-3:2011 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.