• There are no items in your cart

INCITS/ISO/IEC 9797 : 1994

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM

Available format(s)

Hardcopy , PDF

Withdrawn date

07-23-2013

Language(s)

English

Published date

01-01-1994

US$47.70
Excluding Tax where applicable

Foreword
Introduction
1 Scope
2 Normative references
3 Definitions and notations
4 Requirements
5 MAC calculation
Annex A (normative) Optional Processes
Annex B (informative) Examples
Annex C (informative) Bibliography

Describes a method of using a key and an n-bit block cipher algorithm to calculate an m-bit cryptographic check value. This method can be used as a data integrity mechanism to detect that data has not been altered in an unauthorised manner.

DocumentType
Standard
Pages
12
PublisherName
Information Technology Industry Council
Status
Withdrawn

Standards Relationship
ISO/IEC 9797:1994 Identical

ANSI X9.19 : 1996 FINANCIAL INSTITUTION RETAIL MESSAGE AUTHENTICATION
ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
ANSI X9.9 : 86(R1994) FINANCIAL INSTITUTION MESSAGE AUTHENTICATION (WHOLESALE)
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10181-5:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.