Your cart is currently empty!

ISO 9797:2011
ISO 9797:2011 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher
CDN $312.00
Description
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
Edition
2
Published Date
2011-03-01
Status
PUBLISHED
Pages
40
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 27022:2021 Information technology – Guidance on information security management system processes
0 out of 5CDN $312.00 Add to cart -
ISO 27007:2020 Information security, cybersecurity and privacy protection – Guidelines for information security management systems auditing
0 out of 5CDN $312.00 Add to cart -
ISO 20009:2022 Information security – Anonymous entity authentication – Part 3: Mechanisms based on blind signatures
0 out of 5CDN $173.00 Add to cart -
ISO 27000:2018 Information technology – Security techniques – Information security management systems – Overview and vocabulary
0 out of 5CDN $0.00 Add to cart