Norm

NEN-ISO/IEC 9797-2:2002 en

Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

  • Deze norm is ingetrokken sinds 31-05-2011

73,12

Over deze norm

Status Ingetrokken
Aantal pagina's 14
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 01-07-2002
Taal Engels
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an en-tity in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the length (in bits) m of the MAC, and on the specific mechanism.

Details

ICS-code 35.040
Nederlandse titel Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Engelse titel Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Vervangen door

Winkelwagen

Subtotaal:

Ga naar winkelwagen