BS ISO/IEC 9797-2:2021
$198.66
Information security. Message authentication codes (MACs) – Mechanisms using a dedicated hash-function
Published By | Publication Date | Number of Pages |
BSI | 2021 | 62 |
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
A general framework for the provision of integrity services is specified in ISO/IEC 10181-6 .
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Symbols and notation |
13 | 5 Requirements |
14 | 6 MAC Algorithm 1 6.1 General |
15 | 6.2 Description of MAC Algorithm 1 6.2.1 General 6.2.2 Step 1 (key expansion) 6.2.3 Step 2 (modification of the constants and the IV) |
16 | 6.2.4 Step 3 (hashing operation) 6.2.5 Step 4 (output transformation) 6.2.6 Step 5 (truncation) 6.3 Efficiency 6.4 Computation of the constants 6.4.1 General |
17 | 6.4.2 Dedicated hash-function 1 (RIPEMD-160) 6.4.3 Dedicated hash-function 2 (RIPEMD-128) |
18 | 6.4.4 Dedicated hash-function 3 (SHA-1) 6.4.5 Dedicated hash-function 4 (SHA-256) 6.4.6 Dedicated hash-function 5 (SHA-512) |
19 | 6.4.7 Dedicated hash-function 6 (SHA-384) 6.4.8 Dedicated hash-function 8 (SHA-224) |
20 | 6.4.9 Dedicated hash-function 17 (SM3) 7 MAC Algorithm 2 7.1 General 7.2 Description of MAC Algorithm 2 7.2.1 General |
21 | 7.2.2 Step 1 (key expansion) 7.2.3 Step 2 (hashing operation) 7.2.4 Step 3 (output transformation) 7.2.5 Step 4 (truncation) 7.3 Efficiency 8 MAC Algorithm 3 8.1 General |
22 | 8.2 Description of MAC Algorithm 3 8.2.1 General 8.2.2 Step 1 (key expansion) 8.2.3 Step 2 (modification of the constants and the IV) |
23 | 8.2.4 Step 3 (padding) 8.2.5 Step 4 (application of the round-function) 8.2.6 Step 5 (truncation) 8.3 Efficiency 9 MAC Algorithm 4 9.1 General |
24 | 9.2 Description of MAC Algorithm 4 9.3 Encoding and padding 9.3.1 Integer to byte encoding |
25 | 9.3.2 String encoding 9.3.3 Padding |
26 | 9.4 KMAC128 9.4.1 General 9.4.2 Step 1 (Prepare newD) 9.4.3 Step 2 (Prepare X) 9.4.4 Step 3 (Generate MAC output) 9.5 KMAC256 9.5.1 General 9.5.2 Step 1 (Prepare newD) |
27 | 9.5.3 Step 2 (Prepare X) 9.5.4 Step 3 (Generate MAC output) 9.6 KMACXOF128 9.6.1 General 9.6.2 Step 1 (Prepare newD) 9.6.3 Step 2 (Prepare X) |
28 | 9.6.4 Step 3 (Generate MAC output) 9.7 KMACXOF256 9.7.1 General 9.7.2 Step 1 (Prepare newD) 9.7.3 Step 2 (Prepare X) 9.7.4 Step 3 (Generate MAC output) |
29 | Annex A (normative) Object identifiers |
31 | Annex B (informative) Numerical examples |
58 | Annex C (informative) Security analysis of the MAC algorithms |
60 | Bibliography |