Name:
CAN/CSA-ISO/IEC 9797-2-04 (R2012) PDF
Published Date:
01/01/2004
Status:
Active
Publisher:
Canada National Standard/Canadian Standards - ISO/IEC
The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of a hashcode produced by the hash-function, on the strength of the hash-function, on the length (in bits) m of the MAC, and on the specific mechanism. The three mechanisms specified in this part of ISO/IEC 9797 are based on the dedicated hashfunctions specified in ISO/IEC 10118-3.
The first mechanism specified in this part of ISO/IEC 9797 is commonly known as MDx-MAC. It calls the complete hashfunction once, but it makes a small modification to the round-function by adding a key to the additive constants in the round-function. The second mechanism specified in this part of ISO/IEC 9797 is commonly known as HMAC. It calls the complete hash-function twice. The third mechanism specified in this part of ISO/IEC 9797 is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It o_ers a higher performance for applications that work with short input strings only. This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application.
| File Size : | 1 file , 460 KB |
| Number of Pages : | 25 |
| Product Code(s) : | 2416166, 2416166 |
| Published : | 01/01/2004 |