ANSI ISO IEC 9797-1-1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1 Mechanisms using a block cipher《信息技术.安全技术消息认证码(MACs).第1部分 被INCITS采用的使.pdf
《ANSI ISO IEC 9797-1-1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1 Mechanisms using a block cipher《信息技术.安全技术消息认证码(MACs).第1部分 被INCITS采用的使.pdf》由会员分享,可在线阅读,更多相关《ANSI ISO IEC 9797-1-1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1 Mechanisms using a block cipher《信息技术.安全技术消息认证码(MACs).第1部分 被INCITS采用的使.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、Reference numberISO/IEC 9797-1:1999(E)ISO/IEC 1999INTERNATIONALSTANDARDISO/IEC9797-1First edition1999-12-15Information technology Securitytechniques Message AuthenticationCodes (MACs) Part 1:Mechanisms using a block cipherTechnologies de linformation Techniques de scurit Codesdauthentification de me
2、ssage (MACs) Partie 1: Mcanismes utilisant un cryptogramme blocAdopted by INCITS (InterNational Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 12/13/00Published by American National Standards Institute,25 West 43rd Street, New York, New York 1
3、0036Copyright 2002 by Information Technology Industry Council (ITI).All rights reserved.These materials are subject to copyright claims of International Standardization Organization (ISO), InternationalElectrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information T
4、echnology Industry Council(ITI). Not for resale. No part of this publication may be reproduced in any form, including an electronic retrieval system, withoutthe prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW,Washington, DC 200
5、05.Printed in the United States of AmericaISO/IEC 9797-1:1999(E)PDF disclaimerThis PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall notbe edited unless the typefaces which are embedded are licensed to and installed on t
6、he computer performing the editing. In downloading thisfile, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in thisarea.Adobe is a trademark of Adobe Systems Incorporated.Details of the software products used to c
7、reate this PDF file can be found in the General Info relative to the file; the PDF-creation parameterswere optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely eventthat a problem relating to it is found, please inform th
8、e Central Secretariat at the address given below. ISO/IEC 1999All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronicor mechanical, including photocopying and microfilm, without permission in writing from eith
9、er ISO at the address below or ISOs member bodyin the country of the requester.ISO copyright officeCase postale 56 Gb7 CH-1211 Geneva 20Tel. + 41 22 749 01 11Fax + 41 22 734 10 79E-mail copyrightiso.chWeb www.iso.chPrinted in Switzerlandii ISO/IEC 1999 All rights reservedISO/IEC 9797-1:1999(E) ISO/I
10、EC 1999 All rights reserved iiiForewordISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission)form the specialized system for worldwide standardization. National bodies that are members of ISO or IECparticipate in the development of Internatio
11、nal Standards through technical committees established by therespective organization to deal with particular fields of technical activity. ISO and IEC technical committeescollaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, inliaison with IS
12、O and IEC, also take part in the work.International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3.In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.Draft International Standards adopted by the
13、joint technical committee are circulated to national bodies for voting.Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.Attention is drawn to the possibility that some of the elements of this part of ISO/IEC 9797 may be the subject ofp
14、atent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.International Standard ISO/IEC 9797-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Informationtechnology, Subcommittee SC 27, IT Security techniques.This first edition of ISO/IEC 9797-1,
15、 together with the subsequent parts of ISO/IEC 9797, cancels and replacesISO/IEC 9797:1994, which has been revised and extended to a multi-part standard. Note, however, thatimplementations which comply with ISO/IEC 9797:1994 will be compliant with this edition of ISO/IEC 9797-1.ISO/IEC 9797 consists
16、 of the following parts, under the general title Information technology Securitytechniques Message Authentication Codes (MACs):Gbe Part 1: Mechanisms using a block cipherGbe Part 2: Mechanisms using a hash-functionFurther parts may follow.Annexes A and B of this part of ISO/IEC 9797 are for informat
17、ion only.INTERNATIONAL STANDARD ISO#2FIEC ISO#2FIEC 9797-1:1999#28E#29Information technology | Security techniques |Message Authentication Codes #28MACs#29 |Part 1:Mechanisms using a block cipher1 ScopeThispart ofISO#2FIEC 9797speci#0Ces six MAC algorithmsthat use a secret key and an n-bit block cip
18、her to calcu-late an m-bit MAC. These mechanisms can be used asdata integritymechanisms to verify that data has notbeen altered in an unauthorised manner. They can alsobe used as message authentication mechanisms to pro-vide assurance that a message has been originated byan entity in possession of t
19、he secret key. The strengthof the data integritymechanism and message authenti-cation mechanism is dependent on the length #28in bits#29k?and secrecy of the key,ontheblock length #28in bits#29 nand strength of the block cipher, on the length #28in bits#29m of the MAC, and on the speci#0Cc mechanism.
20、The #0Crst three mechanisms speci#0Ced in this part ofISO#2FIEC 9797 are commonly known as CBC-MAC#28CBC is the abbreviation of Cipher Block Chaining#29.The calculation of a MAC as described in ISO 8731-1 and ANSI X9.9 is a speci#0Cc case of this part ofISO#2FIEC 9797 when n = 64, m =32,MAC Algorith
21、m1and Padding Method 1 are used, and the block cipheris DEA #28ANSI X3.92: 1981#29. The calculation of a MACas described in ANSI X9.19 and ISO 9807 is a speci#0Cccase of this part of ISO#2FIEC 9797 when n =64,m =32,either MAC Algorithm 1 or MAC Algorithm 3 is used#28both with Padding Method 1#29, an
22、d the block cipher isDEA #28ANSI X3.92: 1981#29.The fourth mechanism is a variant of CBC-MAC witha special initial transformation. It is recommended forapplications which require that the key length of theMAC algorithm is twice that of the block cipher.NOTES1For example, in the case of DEA #28ANSI X
23、3.92: 1981#29,the block cipher key length is 56 bits, while the MACalgorithm key length is 112 bits.2 When used with DEA #28whichisalsoknown as DES#29,this algorithm is called MacDES #5B12#5D.The #0Cfth and sixth mechanismuse two parallelinstancesof the #0Crst and fourth mechanismrespectively, and c
24、om-bine the two results with a bitwise exclusive-or opera-tion. They are recommended for applications whichre-quire an increased security level against forgery attacks#28cf. Annex B#29. The #0Cfth mechanism uses a single lengthMAC algorithmkey, while the sixth mechanismdoublesthe MAC algorithm key l
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
本资源只提供5页预览,全部文档请下载后查看!喜欢就下载吧,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIISOIEC979711999INFORMATIONTECHNOLOGYSECURITYTECHNIQUESMESSAGEAUTHENTICATIONCODESMACSPART1MECHANISMSUSINGABLOCKCIPHER

链接地址:http://www.mydoc123.com/p-437278.html