Shopping Cart

No products in the cart.

BS ISO/IEC 9797-2:2021

$198.66

Information security. Message authentication codes (MACs) – Mechanisms using a dedicated hash-function

Published By Publication Date Number of Pages
BSI 2021 62
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.

NOTE

A general framework for the provision of integrity services is specified in ISO/IEC 10181-6 .

PDF Catalog

PDF Pages PDF Title
2 undefined
7 Foreword
9 1 Scope
2 Normative references
3 Terms and definitions
11 4 Symbols and notation
13 5 Requirements
14 6 MAC Algorithm 1
6.1 General
15 6.2 Description of MAC Algorithm 1
6.2.1 General
6.2.2 Step 1 (key expansion)
6.2.3 Step 2 (modification of the constants and the IV)
16 6.2.4 Step 3 (hashing operation)
6.2.5 Step 4 (output transformation)
6.2.6 Step 5 (truncation)
6.3 Efficiency
6.4 Computation of the constants
6.4.1 General
17 6.4.2 Dedicated hash-function 1 (RIPEMD-160)
6.4.3 Dedicated hash-function 2 (RIPEMD-128)
18 6.4.4 Dedicated hash-function 3 (SHA-1)
6.4.5 Dedicated hash-function 4 (SHA-256)
6.4.6 Dedicated hash-function 5 (SHA-512)
19 6.4.7 Dedicated hash-function 6 (SHA-384)
6.4.8 Dedicated hash-function 8 (SHA-224)
20 6.4.9 Dedicated hash-function 17 (SM3)
7 MAC Algorithm 2
7.1 General
7.2 Description of MAC Algorithm 2
7.2.1 General
21 7.2.2 Step 1 (key expansion)
7.2.3 Step 2 (hashing operation)
7.2.4 Step 3 (output transformation)
7.2.5 Step 4 (truncation)
7.3 Efficiency
8 MAC Algorithm 3
8.1 General
22 8.2 Description of MAC Algorithm 3
8.2.1 General
8.2.2 Step 1 (key expansion)
8.2.3 Step 2 (modification of the constants and the IV)
23 8.2.4 Step 3 (padding)
8.2.5 Step 4 (application of the round-function)
8.2.6 Step 5 (truncation)
8.3 Efficiency
9 MAC Algorithm 4
9.1 General
24 9.2 Description of MAC Algorithm 4
9.3 Encoding and padding
9.3.1 Integer to byte encoding
25 9.3.2 String encoding
9.3.3 Padding
26 9.4 KMAC128
9.4.1 General
9.4.2 Step 1 (Prepare newD)
9.4.3 Step 2 (Prepare X)
9.4.4 Step 3 (Generate MAC output)
9.5 KMAC256
9.5.1 General
9.5.2 Step 1 (Prepare newD)
27 9.5.3 Step 2 (Prepare X)
9.5.4 Step 3 (Generate MAC output)
9.6 KMACXOF128
9.6.1 General
9.6.2 Step 1 (Prepare newD)
9.6.3 Step 2 (Prepare X)
28 9.6.4 Step 3 (Generate MAC output)
9.7 KMACXOF256
9.7.1 General
9.7.2 Step 1 (Prepare newD)
9.7.3 Step 2 (Prepare X)
9.7.4 Step 3 (Generate MAC output)
29 Annex A (normative) Object identifiers
31 Annex B (informative) Numerical examples
58 Annex C (informative) Security analysis of the MAC algorithms
60 Bibliography
BS ISO/IEC 9797-2:2021
$198.66