{"id":374935,"date":"2024-10-20T02:41:10","date_gmt":"2024-10-20T02:41:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9797-22021\/"},"modified":"2024-10-26T04:40:54","modified_gmt":"2024-10-26T04:40:54","slug":"bs-iso-iec-9797-22021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9797-22021\/","title":{"rendered":"BS ISO\/IEC 9797-2:2021"},"content":{"rendered":"
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m<\/i>-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.<\/p>\n A general framework for the provision of integrity services is specified in ISO\/IEC 10181-6<\/span><\/span> .<\/p>\n<\/div>\n Information security. Message authentication codes (MACs) – Mechanisms using a dedicated hash-function<\/b><\/p>\nPDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n undefined <\/td>\n<\/tr>\n \n 7<\/td>\n Foreword <\/td>\n<\/tr>\n \n 9<\/td>\n 1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n\n 11<\/td>\n 4 Symbols and notation <\/td>\n<\/tr>\n \n 13<\/td>\n 5 Requirements <\/td>\n<\/tr>\n \n 14<\/td>\n 6 MAC Algorithm 1
6.1 General <\/td>\n<\/tr>\n\n 15<\/td>\n 6.2 Description of MAC Algorithm 1
6.2.1 General
6.2.2 Step 1 (key expansion)
6.2.3 Step 2 (modification of the constants and the IV) <\/td>\n<\/tr>\n\n 16<\/td>\n 6.2.4 Step 3 (hashing operation)
6.2.5 Step 4 (output transformation)
6.2.6 Step 5 (truncation)
6.3 Efficiency
6.4 Computation of the constants
6.4.1 General <\/td>\n<\/tr>\n\n 17<\/td>\n 6.4.2 Dedicated hash-function 1 (RIPEMD-160)
6.4.3 Dedicated hash-function 2 (RIPEMD-128) <\/td>\n<\/tr>\n\n 18<\/td>\n 6.4.4 Dedicated hash-function 3 (SHA-1)
6.4.5 Dedicated hash-function 4 (SHA-256)
6.4.6 Dedicated hash-function 5 (SHA-512) <\/td>\n<\/tr>\n\n 19<\/td>\n 6.4.7 Dedicated hash-function 6 (SHA-384)
6.4.8 Dedicated hash-function 8 (SHA-224) <\/td>\n<\/tr>\n\n 20<\/td>\n 6.4.9 Dedicated hash-function 17 (SM3)
7 MAC Algorithm 2
7.1 General
7.2 Description of MAC Algorithm 2
7.2.1 General <\/td>\n<\/tr>\n\n 21<\/td>\n 7.2.2 Step 1 (key expansion)
7.2.3 Step 2 (hashing operation)
7.2.4 Step 3 (output transformation)
7.2.5 Step 4 (truncation)
7.3 Efficiency
8 MAC Algorithm 3
8.1 General <\/td>\n<\/tr>\n\n 22<\/td>\n 8.2 Description of MAC Algorithm 3
8.2.1 General
8.2.2 Step 1 (key expansion)
8.2.3 Step 2 (modification of the constants and the IV) <\/td>\n<\/tr>\n\n 23<\/td>\n 8.2.4 Step 3 (padding)
8.2.5 Step 4 (application of the round-function)
8.2.6 Step 5 (truncation)
8.3 Efficiency
9 MAC Algorithm 4
9.1 General <\/td>\n<\/tr>\n\n 24<\/td>\n 9.2 Description of MAC Algorithm 4
9.3 Encoding and padding
9.3.1 Integer to byte encoding <\/td>\n<\/tr>\n\n 25<\/td>\n 9.3.2 String encoding
9.3.3 Padding <\/td>\n<\/tr>\n\n 26<\/td>\n 9.4 KMAC128
9.4.1 General
9.4.2 Step 1 (Prepare newD)
9.4.3 Step 2 (Prepare X)
9.4.4 Step 3 (Generate MAC output)
9.5 KMAC256
9.5.1 General
9.5.2 Step 1 (Prepare newD) <\/td>\n<\/tr>\n\n 27<\/td>\n 9.5.3 Step 2 (Prepare X)
9.5.4 Step 3 (Generate MAC output)
9.6 KMACXOF128
9.6.1 General
9.6.2 Step 1 (Prepare newD)
9.6.3 Step 2 (Prepare X) <\/td>\n<\/tr>\n\n 28<\/td>\n 9.6.4 Step 3 (Generate MAC output)
9.7 KMACXOF256
9.7.1 General
9.7.2 Step 1 (Prepare newD)
9.7.3 Step 2 (Prepare X)
9.7.4 Step 3 (Generate MAC output) <\/td>\n<\/tr>\n\n 29<\/td>\n Annex A (normative) Object identifiers <\/td>\n<\/tr>\n \n 31<\/td>\n Annex B (informative) Numerical examples <\/td>\n<\/tr>\n \n 58<\/td>\n Annex C (informative) Security analysis of the MAC algorithms <\/td>\n<\/tr>\n \n 60<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2021<\/td>\n 62<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":374945,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-374935","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/374935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/374945"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=374935"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=374935"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=374935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}