• CAN/CSA-ISO/IEC 9797-1:12 (R2016)

    Current The latest, up-to-date edition.

    Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2012

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and notation
    5 Requirements
    6 Model for MAC algorithms
    7 MAC algorithms
    Annex A (normative) - Object identifiers
    Annex B (informative) - Examples
    Annex C (informative) - A security analysis of the MAC
            algorithms
    Annex D (informative) - A comparison with previous MAC
            algorithm standards
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

    Scope - (Show below) - (Hide below)

    Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). At the time of publication, ISO/IEC 9797-1:2011 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application. Key management mechanisms are outside the scope of this part of ISO/IEC 9797. This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ANSI X9.19 : 1996 FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
    ANSI X9.9 : 86(R1994) FINANCIAL INSTITUTION MESSAGE AUTHENTICATION (WHOLESALE)
    ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
    ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective