ISO/IEC 9797-3
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
active, Most Current
Buy Now
Organization: | ISO |
Publication Date: | 15 November 2011 |
Status: | active |
Page Count: | 32 |
ICS Code (Information coding): | 35.040 |
scope:
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4:
a) UMAC;
b) Badger;
c) Poly1305-AES;
d) GMAC.
Document History

February 1, 2020
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hashfunction AMENDMENT 1
A description is not available for this item.

ISO/IEC 9797-3
November 15, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers...