没有合适的资源?快使用搜索试试~ 我知道了~
ISO9797-English
5星 · 超过95%的资源 需积分: 50 149 下载量 139 浏览量
2009-11-27
14:35:04
上传
评论
收藏 1.12MB PDF 举报
温馨提示
试读
20页
ISO9797, Message Authentication Codes
资源推荐
资源详情
资源评论
STDoISO
979?-3-ENGL
3799
m
4853903
0832093
25T
D
INTERNATIONAL
STANDARD
ISO/IEC
9797-1
First
edition
1999-1
2-1
5
Information technology
-
Security
techniques
-
Message Authentication
Codes (MACs)
-
Part
1:
Mechanisms using a block cipher
Technologies de l'information
-
Techniques de sécurité
-
Codes
d'authentification de message (MACs)
-
Partie
1:
Mécanismes utilisant un cryptogramme
bloc
Reference
number
ISOAEC
9797-1:1999(E)
@
ISOAEC
1999
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
STD-IS0
7777-3-ENGL 3999 4853903 0832074 37b
H
ISOAEC 9797-1 :1999(E)
PDF
disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not
be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this
file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The
IS0
Central Secretariat accepts no liability in this
area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
were optimized for printing. Every care has been taken to ensure that the file is suitable for use by
IS0
member bodies. In the unlikely event
that a problem relating to it is found, please inform the Central Secretariat at the address given below.
Q
ISOAEC 1999
All
tights reserved. UnlW otherwise specified, no part
of
this publication may be reproduced or utilized
in
any
form or by any means, electronic
or mechanical, including photocopying and microfilm, without permission in writing from either
IS0
at the address below or ISOs member
bcdy
in
the country of the requester.
IS0 copyright office
Case postale
56
CH-121
1
Geneva 20
Tel.
+
41 22 749
O1
11
Fax
+41 227341079
E-mail copyright
O
iso.ch
Web
www.iso.ch
Printed in Switzerland
ii
O
ISO/IEC 1999
-
All
rights reserved
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
STD-IS0
9777-3-ENGL
3997
m
4851703
0832095
O22
m
ISOAEC
9797-1 :1999(E)
Foreword
IS0
(the International Organization for Standardization) and IEC (the International Electrotechnical Commission)
form the specialized system for worldwide standardization. National bodies that are members of
IS0
or IEC
participate in the development of International Standards through technical committees established by the
respective organization to deal with particular fields of technical activity.
IS0
and IEC technical committees
collaborate
in
fields of mutual interest. Other international organizations, governmental and non-governmental,
in
liaison with
IS0
and IEC, also take part in the work.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part
3.
In the field of information technology,
IS0
and IEC have established a joint technical committee, ISOAEC JTC 1.
Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting.
Publication as an International Standard requires approval by
at
least 75
o/o
of
the national bodies casting a vote.
Attention is drawn to the possibility that some
of
the elements
of
this
part of ISOllEC 9797 may be the subject
of
patent rights.
IS0
and IEC shall not be held responsible for identifying any or all such patent rights.
International Standard ISOAEC 9797-1 was prepared by Joint Technical Committee ISOAEC JTC 1,
lnformation
technology,
Subcommittee SC 27,
IT Security techniques.
This first edition of ISOAEC 9797-1, together with the subsequent parts of ISOAEC 9797, cancels and replaces
ISOAEC
9797:1994, which has been revised and extended to a multi-part standard. Note, however, that
implementations which comply with ISO/IEC 9797:1994 will be compliant with this edition of ISOAEC 9797-1.
ISOAEC 9797 consists
of
the following parts, under the general title
lnformation technology
-
Security
techniques
-
Message Authentication Codes (MACs)
-
Part
I:
Mechanisms using
a
block cipher
-
Part
2:
Mechanisms using a hash-function
Further parts may follow.
Annexes A and
B
of
this part
of
ISOAEC 9797 are for information only.
O
ISO/IEC
1999
-
All
rights reserved
iii
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
STDmISO
9797-L-ENGL
L979
Li853903
OBL209b
Tb9
m
INTERNATIONAL STANDARD
O
ISO/IEC
ISO/IEC 9797-1:1999(E)
Information technology
-
Security techniques
-
Message Aut hentication Codes (MACs)
-
Part
1:
Mechanisms
using
a
block
cipher
1
Scope
This part of ISO/IEC 9797 specifies six MAC algorithms
that use a secret key and an n-bit block cipher to calcu-
late an rn-bit MAC. These mechanisms can be used
as
data integrity mechanisms to verify that data has not
been altered in an unauthorised manner. They can also
be used
as
message authentication mechanisms to pro-
vide assurance that
a
message has been originated by
an entity in possession of the secret key. The strength
of
the data integrity mechanism and message authenti-
cation mechanism
is
dependent on the length (in bits)
k"
and secrecy of the key, on the block length (in bits)
n
and strength of the block cipher, on the length (in bits)
m
of the MAC, and on the specific mechanism.
The
first
three mechanisms specified in this part of
ISO/IEC 9797 are commonly known
as
CBC-MAC
(CBC
is
the abbreviation of Cipher Block Chaining).
The calculation of a MAC
as
described in
IS0
8731-
1
and ANSI X9.9
is
a specific case
of
this part of
ISO/IEC 9797 when
n
=
64,
m
=
32, MAC Algorithm
1
and Padding Method
1
are used, and the block cipher
is DEA (ANSI X3.92: 1981). The calculation
of
a MAC
as
described in ANSI X9.19 and
IS0
9807
is
a
specific
case of this part
of
ISO/IEC 9797 when
n
=
64,
m
=
32,
either MAC Algorithm
1
or
MAC Algorithm 3
is
used
(both with Padding Method
l),
and the block cipher
is
DEA (ANSI X3.92: 1981).
The fourth mechanism
is
a variant of CBC-MAC with
a
special initial transformation. It
is
recommended for
applications which require that t8he key length
of
the
MAC algorit.hm
is
twice that of the block cipher.
NOTES
1
For
example, in the case
of
DEA (ANSI
X3.92:
1981),
the block cipher key length
is
56
bits, while the MAC
algorithm key length
is
112
bits.
2
When used with DEA (which
is
also known
as
DES),
this algorithm
is
called MacDES
[12].
bine the two results with a bitwise exclusive-or opera-
tion. They are recommended for applications which re-
quire an increased security level against forgery attacks
(cf. Annex B). The fifth mechanism uses
a
single length
MAC algorithm key, while the sixth mechanism doubles
the MAC algorithm key length.
This part of
ISO/IEC
9797 can be applied to the se-
curity services of any security architecture, process,
or
application.
2
Normative
references
The following standards contain provisions which,
through reference in this text, constitute provisions
of
this part
of
ISO/IEC 9797. At the time
of
publication,
the editions indicated were valid. All standards are sub-
ject to revision, and parties to agreements based on this
part
of
ISO/IEC 9797 are encouraged to investigate the
possibility
of
applying the most recent editions of the
standards indicated below. Members of IEC
and
IS0
maintain registers
of
currently valid International Stan-
dards.
IS0
7498-2: 1989,
Information processing systems
-
Open Systems Interconnection
-
Basic Reference Model
-
Part
2:
Security Architecture.
ISO/IEC 9798-1: 1997,
Information technology
-
Se-
curity techniques
-
Entity authentication
-
Part
l:
General.
ISO/IEC
10116: 1997,
Information technology
-
Secu-
rity techniques
-
Modes
of
operation for an n-bit block
cipher.
3
Definitions
3.1
This part
of
ISO/IEC 9797 makes use of the follow-
ing general security-related term defined
in
IS0
7498-2.
The fifth and sixth mechanism use two parallel instances
of the first and fourth mechanism respectively, and com-
1
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
COPYRIGHT International Organization for Standardization
Licensed by Information Handling Services
剩余19页未读,继续阅读
TruthS
- 粉丝: 8
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 80632180.jpg
- 李旭国体注入追踪[5.0](1).zip
- semantic.c
- C语言基础-C语言编程基础之Leetcode编程题解之第39题组合总和.zip
- C语言基础-C语言编程基础之Leetcode编程题解之第38题外观数列.zip
- C语言基础-C语言编程基础之Leetcode编程题解之第37题解数独.zip
- C语言基础-C语言编程基础之Leetcode编程题解之第36题有效的数独.zip
- C语言基础-C语言编程基础之Leetcode编程题解之第35题搜索插入位置.zip
- index.wxml
- C语言基础-C语言编程基础之Leetcode编程题解之第33题搜索旋转排序数组.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
- 1
- 2
前往页