Over deze norm
|Commissie||Informatiebeveiliging, Cyber security en Privacy|
This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application. Key management mechanisms are outside the scope of this part of ISO/IEC 9797. This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.
|Engelse titel||Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher|