ISO/IEC JTC 1/SC 27
Projekta Nr. | ISO/IEC 9797-1:2011 |
---|---|
Nosaukums | <p>ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an <i>n</i>-bit block cipher to calculate an <i>m</i>-bit MAC.</p> <p>ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.</p> <p>Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.</p> <p>ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.</p> |
Reģistrācijas numurs (WIID) | 50375 |
Darbības sfēra | <p>ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an <i>n</i>-bit block cipher to calculate an <i>m</i>-bit MAC.</p> <p>ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application.</p> <p>Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011.</p> <p>ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.</p> |
Statuss | Standarts spēkā |
ICS grupa | 35.040 35.030 |