• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

AS ISO/IEC 9797.1:2019

Current
Current

The latest, up-to-date edition.

Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
Available format(s)

Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English

Published date

16-10-2019

Preview

The objective of this Standard is to specify six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of this part of ISO/IEC 9797.
This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.

Committee
IT-005
DocumentType
Standard
ISBN
978 1 76072 572 3
Pages
38
PublisherName
Standards Australia
Status
Current
Supersedes

Standards Relationship
ISO/IEC 9797-1:2011 Identical

Originated as AS 2805.4.1—1985.
Previous edition 2001.
Revised and redesignated as AS ISO/IEC 9797.1:2019. Originated as AS 2805.4.1-1985. Previous edition 2001. Revised and redesignated as AS ISO/IEC 9797.1:2019.

ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO/IEC 11770-2:2018 IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
ISO 11568-1:2005 Banking — Key management (retail) — Part 1: Principles
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
ISO/IEC 11770-4:2017 Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
ISO/IEC 10116:2006 Information technology Security techniques Modes of operation for an n-bit block cipher
ISO 8732:1988 Banking Key management (wholesale)
ISO/IEC 8825-1:2002 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management

View more information
£82.16
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.