• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 9797-2:2011

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function
Available format(s)

Hardcopy , PDF

Superseded date

29-06-2021

Language(s)

English

Published date

30-09-2015

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 MAC Algorithm 1
7 MAC Algorithm 2
8 MAC Algorithm 3
Annex A (normative) - ASN.1 Module
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the MAC
        algorithms
Bibliography

Defines three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC.

Committee
IST/33/2
DevelopmentNote
Supersedes 99/652492 DC (07/2002)
DocumentType
Standard
Pages
50
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9797-2:2011 Identical

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework

View more information
£246.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.