• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

CSA ISO/IEC 9797-2:2013

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
Available format(s)

Hardcopy , PDF

Superseded date

20-07-2021

Language(s)

English

Published date

01-01-2017

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 MAC Algorithm 1
7 MAC Algorithm 2
8 MAC Algorithm 3
Annex A (normative) - ASN.1 Module
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the
        MAC algorithms
Bibliography

Describes three MAC algorithms that use a secret key and a hash-function with an n-bit result to calculate an m-bit MAC.

DocumentType
Standard
Pages
56
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9797-2:2011 Identical

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework

View more information

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.