ISO/IEC 9797-1:1999 PDF

ISO/IEC 9797-1:1999 PDF

Name:
ISO/IEC 9797-1:1999 PDF

Published Date:
12/01/1999

Status:
Active

Description:

Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$27
Need Help?

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k* and secrecy of the key, on the block length (in bits) n and strength of the block cipher, on the length (in bits) m of the MAC, and on the specific mechanism.

The first three mechanisms specified in this part of ISO/IEC 9797 are commonly known as CBC-MAC (CBC is the abbreviation of Cipher Block Chaining). The calculation of a MAC as described in ISO 8731-1 and ANSI X9.9 is a specific case of this part of ISO/IEC 9797 when n = 64, m = 32, MAC Algorithm 1 and Padding Method 1 are used, and the block cipher is DEA (ANSI X3.92: 1981). The calculation of a MAC as described in ANSI X9.19 and ISO 9807 is a specific case of this part of ISO/IEC 9797 when n = 64, m = 32, either MAC Algorithm 1 or MAC Algorithm 3 is used (both with Padding Method 1), and the block cipher is DEA (ANSI X3.92: 1981).

The fourth mechanism is a variant of CBC-MAC with a special initial transformation. It is recommended for applications which require that the key length of the MAC algorithm is twice that of the block cipher.

The fifth and sixth mechanism use two parallel instances of the first and fourth mechanism respectively, and combine the two results with a bitwise exclusive-or operation. They are recommended for applications which require an increased security level against forgery attacks (cf. Annex B). The fifth mechanism uses a single length MAC algorithm key, while the sixth mechanism doubles the MAC algorithm key length.

This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application.


File Size : 1 file , 710 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 16
Published : 12/01/1999

History

ISO/IEC 9797-1:2011
Published Date: 03/01/2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
$66.9
ISO/IEC 9797-1:1999
Published Date: 12/01/1999
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher
$27

Related products

ISO/IEC 7816-2:2007
Published Date: 10/15/2007
Identification cards - Integrated circuit cards - Part 2: Cards with contacts - Dimensions and location of the contacts
$24.3
ISO/IEC 15938-4:2002
Published Date: 06/15/2002
Information technology - Multimedia content description interface - Part 4: Audio
$83.4
ISO/IEC 7816-12:2005
Published Date: 10/01/2005
Identification cards - Integrated circuit cards - Part 12: Cards with contacts - USB electrical interface and operating procedures
$66.9

Best-Selling Products

PFI ES11
Published Date: 01/01/1996
Permanent Marking on Piping Materials
PFI ES16
Published Date: 01/01/1985
Access Holes, Bosses and Plugs for Radiographic Inspection of Pipe Welds
PFI ES1
Published Date: 07/01/1995
Internal Machining & Solid Machined Backing Rings for Circumferential Butt Welds
PFI ES20
Published Date: 01/01/1997
Wall Thickness Measurement by Ultrasonic Examination
PFI ES21
Published Date: 01/01/1992
Internal Machining & Fit-Up of GTAW Root Pass Circumferential Butt Welds
PFI ES22
Published Date: 01/01/1995
Recommended Practice for Color Coding of Piping Materials