UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Webinars & White Papers

ISO/IEC 9797-1

Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 March 2011
Status: active
Page Count: 48
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.

This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application.

Key management mechanisms are outside the scope of this part of ISO/IEC 9797.

This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.

Document History

ISO/IEC 9797-1
March 1, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of...
December 15, 1999
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms Using a Block Cipher
A description is not available for this item.

References

Advertisement