{"id":374935,"date":"2024-10-20T02:41:10","date_gmt":"2024-10-20T02:41:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9797-22021\/"},"modified":"2024-10-26T04:40:54","modified_gmt":"2024-10-26T04:40:54","slug":"bs-iso-iec-9797-22021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9797-22021\/","title":{"rendered":"BS ISO\/IEC 9797-2:2021"},"content":{"rendered":"

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m<\/i>-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.<\/p>\n

\n
\n NOTE\n <\/div>\n

A general framework for the provision of integrity services is specified in ISO\/IEC 10181-6<\/span><\/span> .<\/p>\n<\/div>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 Symbols and notation <\/td>\n<\/tr>\n
13<\/td>\n5 Requirements <\/td>\n<\/tr>\n
14<\/td>\n6 MAC Algorithm 1
6.1 General <\/td>\n<\/tr>\n
15<\/td>\n6.2 Description of MAC Algorithm 1
6.2.1 General
6.2.2 Step 1 (key expansion)
6.2.3 Step 2 (modification of the constants and the IV) <\/td>\n<\/tr>\n
16<\/td>\n6.2.4 Step 3 (hashing operation)
6.2.5 Step 4 (output transformation)
6.2.6 Step 5 (truncation)
6.3 Efficiency
6.4 Computation of the constants
6.4.1 General <\/td>\n<\/tr>\n
17<\/td>\n6.4.2 Dedicated hash-function 1 (RIPEMD-160)
6.4.3 Dedicated hash-function 2 (RIPEMD-128) <\/td>\n<\/tr>\n
18<\/td>\n6.4.4 Dedicated hash-function 3 (SHA-1)
6.4.5 Dedicated hash-function 4 (SHA-256)
6.4.6 Dedicated hash-function 5 (SHA-512) <\/td>\n<\/tr>\n
19<\/td>\n6.4.7 Dedicated hash-function 6 (SHA-384)
6.4.8 Dedicated hash-function 8 (SHA-224) <\/td>\n<\/tr>\n
20<\/td>\n6.4.9 Dedicated hash-function 17 (SM3)
7 MAC Algorithm 2
7.1 General
7.2 Description of MAC Algorithm 2
7.2.1 General <\/td>\n<\/tr>\n
21<\/td>\n7.2.2 Step 1 (key expansion)
7.2.3 Step 2 (hashing operation)
7.2.4 Step 3 (output transformation)
7.2.5 Step 4 (truncation)
7.3 Efficiency
8 MAC Algorithm 3
8.1 General <\/td>\n<\/tr>\n
22<\/td>\n8.2 Description of MAC Algorithm 3
8.2.1 General
8.2.2 Step 1 (key expansion)
8.2.3 Step 2 (modification of the constants and the IV) <\/td>\n<\/tr>\n
23<\/td>\n8.2.4 Step 3 (padding)
8.2.5 Step 4 (application of the round-function)
8.2.6 Step 5 (truncation)
8.3 Efficiency
9 MAC Algorithm 4
9.1 General <\/td>\n<\/tr>\n
24<\/td>\n9.2 Description of MAC Algorithm 4
9.3 Encoding and padding
9.3.1 Integer to byte encoding <\/td>\n<\/tr>\n
25<\/td>\n9.3.2 String encoding
9.3.3 Padding <\/td>\n<\/tr>\n
26<\/td>\n9.4 KMAC128
9.4.1 General
9.4.2 Step 1 (Prepare newD)
9.4.3 Step 2 (Prepare X)
9.4.4 Step 3 (Generate MAC output)
9.5 KMAC256
9.5.1 General
9.5.2 Step 1 (Prepare newD) <\/td>\n<\/tr>\n
27<\/td>\n9.5.3 Step 2 (Prepare X)
9.5.4 Step 3 (Generate MAC output)
9.6 KMACXOF128
9.6.1 General
9.6.2 Step 1 (Prepare newD)
9.6.3 Step 2 (Prepare X) <\/td>\n<\/tr>\n
28<\/td>\n9.6.4 Step 3 (Generate MAC output)
9.7 KMACXOF256
9.7.1 General
9.7.2 Step 1 (Prepare newD)
9.7.3 Step 2 (Prepare X)
9.7.4 Step 3 (Generate MAC output) <\/td>\n<\/tr>\n
29<\/td>\nAnnex A (normative) Object identifiers <\/td>\n<\/tr>\n
31<\/td>\nAnnex B (informative) Numerical examples <\/td>\n<\/tr>\n
58<\/td>\nAnnex C (informative) Security analysis of the MAC algorithms <\/td>\n<\/tr>\n
60<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security. Message authentication codes (MACs) – Mechanisms using a dedicated hash-function<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n62<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":374945,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-374935","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/374935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/374945"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=374935"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=374935"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=374935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}