Standard
Track updates
AS ISO/IEC 9797.2:2019
[Current]The objective of this Standard is to specify three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity and message authentication mechanisms is dependent on the entropy and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the length (in bits) m of the MAC, and on the specific mechanism.
Published: 16/10/2019
Pages: 39
Table of contents
Cited references
Content history
Table of contents
Header
About this publication
Preface
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 MAC Algorithm 1
6.1 Description of MAC Algorithm 1
6.1.1 Step 1 (key expansion)
6.1.2 Step 2 (modification of the constants and the IV)
6.1.3 Step 3 (hashing operation)
6.1.4 Step 4 (output transformation)
6.1.5 Step 5 (truncation)
6.2 Efficiency
6.3 Computation of the constants
6.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
6.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
6.3.3 Dedicated Hash-Function 3 (SHA-1)
6.3.4 Dedicated Hash-Function 4 (SHA-256)
6.3.5 Dedicated Hash-Function 5 (SHA-512)
6.3.6 Dedicated Hash-Function 6 (SHA-384)
6.3.7 Dedicated Hash-Function 8 (SHA-224)
7 MAC Algorithm 2
7.1 Description of MAC Algorithm 2
7.1.1 Step 1 (key expansion)
7.1.2 Step 2 (hashing operation)
7.1.3 Step 3 (output transformation)
7.1.4 Step 4 (truncation)
7.2 Efficiency
8 MAC Algorithm 3
8.1 Description of MAC Algorithm 3
8.1.1 Step 1 (key expansion)
8.1.2 Step 2 (modification of the constants and the IV)
8.1.3 Step 3 (padding)
8.1.4 Step 4 (application of the round-function)
8.1.5 Step 5 (truncation)
8.2 Efficiency
Annex A
Annex B
B.1 General
B.2 MAC Algorithm 1
B.2.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.2.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.2.3 Dedicated Hash-Function 3 (SHA-1)
B.2.4 Dedicated Hash-Function 4 (SHA-256)
B.2.5 Dedicated Hash-Function 5 (SHA-512)
B.2.6 Dedicated Hash-Function 6 (SHA-384)
B.2.7 Dedicated Hash-Function 8 (SHA-224)
B.3 MAC Algorithm 2
B.3.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.3.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.3.3 Dedicated Hash-Function 3 (SHA-1)
B.3.4 Dedicated Hash-Function 4 (SHA-256)
B.3.5 Dedicated Hash-Function 5 (SHA-512)
B.3.6 Dedicated Hash-Function 6 (SHA-384)
B.3.7 Dedicated Hash-Function 7 (WHIRLPOOL)
B.3.8 Dedicated Hash-Function 8 (SHA-224)
B.4 MAC Algorithm 3
B.4.1 Dedicated Hash-Function 1 (RIPEMD-160)
B.4.2 Dedicated Hash-Function 2 (RIPEMD-128)
B.4.3 Dedicated Hash-Function 3 (SHA-1)
B.4.4 Dedicated Hash-Function 4 (SHA-256)
B.4.5 Dedicated Hash-Function 5 (SHA-512)
B.4.6 Dedicated Hash-Function 6 (SHA-384)
B.4.7 Dedicated Hash-Function 8 (SHA-224)
Annex C
Bibliography
Cited references in this standard