Your cart is currently empty!

ISO 9797:2011
ISO 9797:2011 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher
CDN $312.00
Description
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
Edition
2
Published Date
2011-03-01
Status
PUBLISHED
Pages
40
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 22739:2024 Blockchain and distributed ledger technologies – Vocabulary
0 out of 5CDN $173.00 Add to cart -
ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
0 out of 5CDN $312.00 Add to cart -
ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
0 out of 5CDN $233.00 Add to cart -
ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
0 out of 5CDN $273.00 Add to cart