해외표준 상세정보
관심표준 등록 : 표준업데이트 시 알림서비스
제공형태 더보기-
구판
판매
ISO/IEC 9797-2:2011
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function- 발행일 : 2011-05-02
- 발행기관 : ISO/IEC
상세정보
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | Message Authentication Code (MAC) algorithms are data integrity mechanisms that compute a short string (the Message Authentication Code or MAC) as a complex function of every bit of the data and of a secret key. Their main security property is unforgeability: someone who does not know the secret key should not be able to predict the MAC on any new data string. MAC algorithms can be used to provide data integrity. Their purpose is the detection of any unauthorized modification of the data such as deletion, insertion, or transportation of items within data. This includes both malicious and accidental modifications. MAC algorithms can also provide data origin authentication. This means that they can provide assurance that a message has been originated by an entity in possession of a specific secret key. ISO/IEC 9797-2:2011 specifies three MAC algorithms that are based on a dedicated hash-function (selected from ISO/IEC 10118-3). ISO/IEC 9797-2:2011 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of the hash-function and its strength, on the length (in bits) m of the MAC, and on the specific mechanism. The first mechanism specified in ISO/IEC 9797-2:2011 is commonly known as MDx-MAC. It calls the complete hash-function once, but it makes a small modification to the round-function by adding a key to the additive constants in the round-function. The second mechanism specified in ISO/IEC 9797-2:2011 is commonly known as HMAC. It calls the complete hash-function twice. The third mechanism specified in ISO/IEC 9797-2:2011 is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It offers a higher performance for applications that work with short input strings only. |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 39 |
Edition | 2 |
이력정보
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | ISO/IEC 9797-2:2021/Cor 1:2024상세보기 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1 | 2024-11-28 | 표준 |
2 | ISO/IEC 9797-2:2021/COR1:2024상세보기 | Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1 | 2024-11-28 | 표준 |
3 | CSA ISO/IEC 9797-2:22상세보기 | Information technology - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2021, third edition, 2021-06) | 2022-01-01 | 표준 |
4 | ISO/IEC 9797-2:2021상세보기 | Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function | 2021-06-23 | 표준 |
5 | ISO/IEC 9797-2:2021상세보기 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | 2021-06-23 | 표준 |
6 | CAN/CSA-ISO/IEC 9797-2:13 (R2017)상세보기 | Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) | 2013-01-01 | 폐지 |
7 | ISO/IEC 9797-2:2011상세보기 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | 2011-05-02 | 구판 |
8 | ISO/IEC 9797-2:2011상세보기 | Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function | 2011-05-02 | 구판 |
9 | ISO/IEC 9797-2:2002상세보기 | Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function | 2002-06-13 | 구판 |
10 | ISO/IEC 9797-2:2002상세보기 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | 2002-06-13 | 구판 |
관련상품
- ISO/IEC 9797-1:2011 - Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
- ISO/IEC 9797-1:2011 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
- ISO/IEC 9797-3:2011 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
- ISO/IEC 9797-3:2011 - Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
- CSA ISO/IEC 9797-1:12 (R2021) - Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)
다른 사람이 함께 구입한 상품
- 함께 구입한 상품이 존재하지 않습니다.
추천 상품
- IEC TS 63134:2020 - Active assisted living (AAL) use cases
- IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification
- KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs)
- KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs)
- KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스
제공형태 닫기
PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)보안PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능PRINT :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)BOOK :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)ZIP :
압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)CD/DVD :
직접 파일 다운로드 및 인쇄(마이페이지 확인)DB :
별도 정보 제공HARDCOPY :
해외 배송 상품, 최대 3주 소요바인더 :
바인더 우편발송, 2~3일 소요온라인구독 :
WEB 접속 후 실시간 열람, 출력(1년간)