• Shopping Cart
    There are no items in your cart

ISO/IEC 9797-3:2011

Current

Current

The latest, up-to-date edition.

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

08-11-2011

€127.00
Excluding VAT

ISO/IEC 9797-3:2011 specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4:

  1. UMAC;
  2. Badger;
  3. Poly1305-AES;
  4. GMAC.

Committee
ISO/IEC JTC 1/SC 27
DevelopmentNote
NEW CHILD AMD 1 IS NOW ADDED
DocumentType
Standard
Pages
25
ProductNote
THIS STANDARD ALSO REFERS TO IETF RFC 4418 NEW CHILD AMD 1 IS NOW ADDED
PublisherName
International Organization for Standardization
Status
Current

ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
BS ISO 16609:2012 Financial services. Requirements for message authentication using symmetric techniques
INCITS/ISO/IEC 10118-3:2018(2019) IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions<br>
INCITS/ISO/IEC 24727-3:2008(R2019) Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface
INCITS/ISO/IEC 24727-4:2008(R2019) Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration

ISO/IEC 18031:2011 Information technology — Security techniques — Random bit generation
ISO/IEC 18033-3:2010 Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
ISO/IEC 9797-1:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
ISO/IEC 10181-6:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Integrity framework
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€127.00
Excluding VAT