Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $147.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $147.00
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $198.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

Scope

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of this part of ISO/IEC 9797.
This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.
 

Document History

  1. CAN/CSA-ISO/IEC 9797-1:12 (R2021)

    👀currently
    viewing


    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)

    • Most Recent
  2. CAN/CSA-ISO/IEC 9797-1-02 (R2010)


    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher

    • Historical Version