QUICK

TOP

해외표준 상세정보

관심표준 등록 : 표준업데이트 시 알림서비스

제공형태 더보기
  • subList_img01

    폐지

    판매

    CAN/CSA-ISO/IEC 9797-2:13 (R2017)

    Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01)
    • 발행일 : 2013-01-01
    • 발행기관 : CSA
    즐겨찾기 장바구니 담기
    닫기

    상품이 장바구니에 담겼습니다.

    장바구니로 이동
    • [영어]보안PDF 228,300원

상세정보

분야
적용범위 Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard supersedes CAN/CSA-ISO/IEC 9797-2-04 (adoption of ISO/IEC 9797-2:2002). At the time of publication, ISO/IEC 9797-2:2011 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity and message authentication mechanisms is dependent on the entropy and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the length (in bits) m of the MAC, and on the specific mechanism. The three mechanisms specified in this part of ISO/IEC 9797 are based on the dedicated hash-functions specified in ISO/IEC 10118-3. The first mechanism is commonly known as MDx-MAC. It calls the hash function once, but it makes a small modification to the round-function in the hash-function by adding a key to the additive constants in the round-function. The second mechanism is commonly known as HMAC. It calls the hash-function twice. The third mechanism is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It offers higher performance for applications that work with short input data strings only. This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or application. NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6 [5].
국제분류(ICS)코드
페이지수 56
Edition

이력정보

No. 표준번호 표준명 발행일 상태
1 ISO/IEC 9797-2:2021/Cor 1:2024상세보기 Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1 2024-11-28 표준
2 ISO/IEC 9797-2:2021/COR1:2024상세보기 Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1 2024-11-28 표준
3 CSA ISO/IEC 9797-2:22상세보기 Information technology - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2021, third edition, 2021-06) 2022-01-01 표준
4 ISO/IEC 9797-2:2021상세보기 Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function 2021-06-23 표준
5 ISO/IEC 9797-2:2021상세보기 Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 2021-06-23 표준
6 CAN/CSA-ISO/IEC 9797-2:13 (R2017)상세보기 Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) 2013-01-01 폐지
7 ISO/IEC 9797-2:2011상세보기 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 2011-05-02 구판
8 ISO/IEC 9797-2:2011상세보기 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function 2011-05-02 구판
9 ISO/IEC 9797-2:2002상세보기 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function 2002-06-13 구판
10 ISO/IEC 9797-2:2002상세보기 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 2002-06-13 구판

제공형태 닫기

  • PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • 보안PDF :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능
  • PRINT :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • BOOK :

    인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
  • ZIP :

    압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)
  • CD/DVD :

    직접 파일 다운로드 및 인쇄(마이페이지 확인)
  • DB :

    별도 정보 제공
  • HARDCOPY :

    해외 배송 상품, 최대 3주 소요
  • 바인더 :

    바인더 우편발송, 2~3일 소요
  • 온라인구독 :

    WEB 접속 후 실시간 열람, 출력(1년간)