• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

08/30135059 DC : 0

Current

Current

The latest, up-to-date edition.

ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS)

Available format(s)

Hardcopy , PDF

Language(s)

English

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 Requirements
6 MAC Algorithm 1
  6.1 Description of MAC Algorithm 1
      6.1.1 Step 1 (key expansion)
      6.1.2 Step 2 (modification of the constants and the IV)
      6.1.3 Step 3 (hashing operation)
      6.1.4 Step 4 (output transformation)
      6.1.5 Step 5 (truncation)
  6.2 Efficiency
  6.3 Computation of the constants
      6.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
      6.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
      6.3.3 Dedicated Hash-Function 3 (SHA-1)
      6.3.4 Dedicated Hash-Function 4 (SHA-256)
      6.3.5 Dedicated Hash-Function 5 (SHA-512)
      6.3.6 Dedicated Hash-Function 6 (SHA-384)
      6.3.7 Dedicated Hash-Function 8 (SHA-224)
7 MAC Algorithm 2
  7.1 Description of MAC Algorithm 2
      7.1.1 Step 1 (key expansion)
      7.1.2 Step 2 (hashing operation)
      7.1.3 Step 3 (output transformation)
      7.1.4 Step 4 (truncation)
  7.2 Efficiency
8 MAC Algorithm 3
  8.1 Description of MAC Algorithm 3
      8.1.1 Step 1 (key expansion)
      8.1.2 Step 2 (modification of the constants and the IV)
      8.1.3 Step 3 (padding)
      8.1.4 Step 4 (application of the round-function)
      8.1.5 Step 5 (truncation)
  8.2 Efficiency
Annex A (normative) ASN.1 Module
Annex B (informative) Examples
      B.1 General
      B.2 MAC Algorithm 1
          B.2.1 Dedicated Hash-Function 1 (RIPEMD-160)
          B.2.2 Dedicated Hash-Function 2 (RIPEMD-128)
          B.2.3 Dedicated Hash-Function 3 (SHA-1)
          B.2.4 Dedicated Hash-Function 4 (SHA-256)
          B.2.5 Dedicated Hash-Function 5 (SHA-512)
          B.2.6 Dedicated Hash-Function 6 (SHA-384)
          B.2.7 Dedicated Hash-Function 8 (SHA-224)
      B.3 MAC Algorithm 2
          B.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
          B.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
          B.3.3 Dedicated Hash-Function 3 (SHA-1)
          B.3.4 Dedicated Hash-Function 4 (SHA-256)
          B.3.5 Dedicated Hash-Function 5 (SHA-512)
          B.3.6 Dedicated Hash-Function 6 (SHA-384)
          B.3.7 Dedicated Hash-Function 7 (WHIRLPOOL)
          B.3.8 Dedicated Hash-Function 8 (SHA-224)
      B.4 MAC Algorithm 3
          B.4.1 Dedicated Hash-Function 1 (RIPEMD-160)
          B.4.2 Dedicated Hash-Function 2 (RIPEMD-128)
          B.4.3 Dedicated Hash-Function 3 (SHA-1)
          B.4.4 Dedicated Hash-Function 4 (SHA-256)
          B.4.5 Dedicated Hash-Function 5 (SHA-512)
          B.4.6 Dedicated Hash-Function 6 (SHA-384)
          B.4.7 Dedicated Hash-Function 8 (SHA-224)
Annex C (informative) A Security Analysis of the MAC Algorithms
Bibliography

ISO/IEC 9797-2 (REV)

Committee
IST/33
DocumentType
Draft
Pages
43
PublisherName
British Standards Institution
Status
Current

ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework

View more information
£20.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.