Abstract
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.
Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.
ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
General information
-
Status: PublishedPublication date: 2011-03Stage: International Standard confirmed [90.93]
-
Edition: 2Number of pages: 40
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Amendments
Amendments are issued when it is found that new material may need to be added to an existing standardization document. They may also include editorial or technical corrections to be applied to the existing document.
Amendment 1
Edition 2023
Life cycle
-
Previously
WithdrawnISO/IEC 9797-1:1999
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Amendments
Provide additional content; available for purchase; not included in the text of the existing standard.PublishedISO/IEC 9797-1:2011/Amd 1:2023
-
00