Standard
Track updates
AS ISO/IEC 9797.1:2019
[Current]Information technology — Security techniques — Message Authentication Codes (MACs), Part 1: Mechanisms using a block cipher
The objective of this Standard is to specify six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC.
Published: 16/10/2019
Pages: 38
Table of contents
Cited references
Content history
Table of contents
Header
About this publication
Preface
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 Model for MAC algorithms
6.1 General
6.2 Step 1 (key derivation)
6.2.1 General
6.2.2 Key Derivation Method 1
6.2.3 Key Derivation Method 2
6.3 Step 2 (padding)
6.3.1 General
6.3.2 Padding Method 1
6.3.3 Padding Method 2
6.3.4 Padding Method 3
6.3.5 Padding Method 4
6.4 Step 3 (splitting)
6.5 Step 4 (iteration)
6.6 Step 5 (final iteration)
6.6.1 General
6.6.2 Final iteration 1
6.6.3 Final iteration 2
6.6.4 Final iteration 3
6.7 Step 6 (output transformation)
6.7.1 General
6.7.2 Output Transformation 1
6.7.3 Output Transformation 2
6.7.4 Output Transformation 3
6.8 Step 7 (truncation)
7 MAC algorithms
7.1 General
7.2 MAC Algorithm 1
7.3 MAC Algorithm 2
7.4 MAC Algorithm 3
7.5 MAC Algorithm 4
7.6 MAC Algorithm 5
7.7 MAC Algorithm 6
Annex A
Annex B
B.1 General
B.2 MAC Algorithm 1
B.3 MAC Algorithm 2
B.4 MAC Algorithm 3
B.5 MAC Algorithm 4
B.6 MAC Algorithm 5
B.6.1 Examples of MAC generation process
B.6.2 AES using a 128-bit key
B.6.3 AES using a 192-bit key
B.6.4 AES using a 256-bit key
B.6.5 Three-key triple DEA
B.6.6 Two-key triple DEA
B.7 MAC Algorithm 6
B.7.1 Examples of MAC generation process
B.7.2 AES using a 128-bit key
B.7.3 AES using a 192-bit key
B.7.4 AES using a 256-bit key
Annex C
C.1 General
C.2 Rationale
Annex D
Bibliography
Cited references in this standard
Content history
[Superseded]
[Current]
[Superseded]
AS 2805.4.1-2001 Rec:2016
DR AS ISO/IEC 9797.1:2019