This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to
calculate an m-bit MAC.
This part of ISO/IEC 9797 can be applied to the security services of any security architecture, process, or
application.
Key management mechanisms are outside the scope of this part of ISO/IEC 9797.
This part of ISO/IEC 9797 specifies object identifiers that can be used to identify each mechanism in
accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified
algorithms are provided, and the relationship of this part of ISO/IEC 9797 to previous standards is explained.
ISO/IEC 9797-1:2011 history
2023ISO/IEC 9797-1:2011/Amd 1:2023 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
2011ISO/IEC 9797-1:2011 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
1999ISO/IEC 9797-1:1999 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher