ISO/IEC 9797-3:2011
Current
The latest, up-to-date edition.
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
Hardcopy , PDF
English
08-11-2011
ISO/IEC 9797-3:2011 specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4:
- UMAC;
- Badger;
- Poly1305-AES;
- GMAC.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DevelopmentNote |
NEW CHILD AMD 1 IS NOW ADDED
|
| DocumentType |
Standard
|
| Pages |
25
|
| ProductNote |
THIS STANDARD ALSO REFERS TO IETF RFC 4418 NEW CHILD AMD 1 IS NOW ADDED
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Standards | Relationship |
| NEN ISO/IEC 9797-3 : 2011 | Identical |
| BS ISO/IEC 9797-3:2011 | Identical |
| INCITS/ISO/IEC 9797-3 : 2012 | Identical |
| INCITS/ISO/IEC 9797-3:2011(R2022) | Identical |
| ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
| BS ISO 16609:2012 | Financial services. Requirements for message authentication using symmetric techniques |
| INCITS/ISO/IEC 10118-3:2018(2019) | IT Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions<br> |
| INCITS/ISO/IEC 24727-3:2008(R2019) | Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface |
| INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
| ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
| ISO/IEC 18033-3:2010 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 10181-6:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Integrity framework |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
| ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.