ISO/IEC 9797-2:2021/Cor 1:2024
(Corrigendum)Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1
Sécurité de l'information — Codes d'authentication de message (MAC) — Partie 2: Mécanismes utilisant une fonction de hachage dédiée — Rectificatif technique 1
General Information
- Status
- Published
- Publication Date
- 27-Nov-2024
- Current Stage
- 6060 - International Standard published
- Start Date
- 28-Nov-2024
- Completion Date
- 28-Nov-2024
Relations
- Effective Date
- 06-May-2023
Overview
ISO/IEC 9797-2:2021/Cor 1:2024 is a technical corrigendum to ISO/IEC 9797-2:2021, the international standard that specifies message authentication code (MAC) mechanisms based on a dedicated hash-function. This Corrigendum 1 corrects and clarifies algorithm descriptions, notation, constant definitions and implementation details (for example, key processing, constant strings for dedicated hash‑functions, and sponge/KECCAK-related rates). It is intended for implementers and evaluators of MAC algorithms who follow the ISO/IEC 9797 series for message integrity and authentication.
Key Topics and Requirements
- Clarified mathematical notation: use of the ceiling function (⌈x⌉) is explicitly added to Clause 4.
- Key expansion/padding: If K is shorter than 128 bits, concatenate K to itself ⌈128/k⌉ times and select the leftmost 128 bits to form the 128‑bit key K′.
- Key partitioning: Updated representation of a 128‑bit key as K = K0 ∥ K1 ∥ … ∥ K7 (eight 16‑bit or byte-aligned subblocks as defined in the standard).
- Dedicated hash-function constants: Corrections to the 128‑bit constant strings T_i for dedicated hash-functions 4, 5, 6, 8, etc.
- KECCAK / KMAC notes: Corrections clarify SPONGE parameter rates (e.g., numbers 168 and 136 as byte rates corresponding to SPONGE[f, pad, 1344] and SPONGE[f, pad, 1088]) and how KMAC behaves as an XOF (encoded output length = 0).
- MAC lengths: Updates to the specified MAC output lengths m for various dedicated hash-functions (examples: m = 128 for functions 4, 12, 14, 17; m = 192 for functions 6 and 15; etc.).
- Annex and bibliography edits: Text updates in Annex C (security assumption wording) and removal of a bibliography entry.
Practical Applications
- Secure message integrity and authentication for network protocols, APIs, payment systems, embedded/IoT devices, firmware updates, and secure logging.
- Implementations that require conformance to ISO/IEC standards for certification, interoperability, or regulatory compliance.
- Cryptographic libraries, hardware security modules (HSMs), and firmware developers implementing dedicated-hash MAC algorithms and KMAC/KECCAK modes.
Who Should Use This Standard
- Cryptographic engineers and protocol designers implementing or evaluating MAC schemes.
- Software and hardware implementers seeking ISO/IEC 9797 compliance.
- Security auditors, certification bodies, and standards teams validating MAC algorithm behavior and constants.
- Product teams in finance, telecommunications, and IoT requiring standardized message authentication.
Related Standards and Keywords
- Part of the ISO/IEC 9797 series (Message Authentication Codes). Corrigendum addresses dedicated-hash mechanisms and interoperability details involving KECCAK, KMAC, SPONGE constructions, 128-bit key handling, and MAC output lengths.
Keywords: ISO/IEC 9797-2, message authentication code, MAC, dedicated hash-function, KECCAK, KMAC, SPONGE, technical corrigendum, key padding, MAC length.
Frequently Asked Questions
ISO/IEC 9797-2:2021/Cor 1:2024 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1". This standard covers: Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1
ISO/IEC 9797-2:2021/Cor 1:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 9797-2:2021/Cor 1:2024 has the following relationships with other standards: It is inter standard links to ISO/IEC 9797-2:2021. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 9797-2:2021/Cor 1:2024 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
International
Standard
ISO/IEC 9797-2
Third edition
Information security — Message
2021-06
authentication codes (MACs)
Part 2:
TECHNICAL
Mechanisms using a dedicated hash-
CORRIGENDUM 1
function
2024-11
TECHNICAL CORRIGENDUM 1
Sécurité de l'information — Codes d'authentication de message
(MAC)
Partie 2:
Mécanismes utilisant une fonction de hachage dédiée
RECTIFICATIF TECHNIQUE 1
Reference number
ISO/IEC 9797-2:2021/Cor.1 :2024(en) © ISO/IEC 2024
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights
ii
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
Technical Corrigendum 1 to ISO/IEC 9797-2:2021 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Information security, cyber security, and privacy protection.
© ISO/IEC 2024 – All rights
iii
Information security — Message authentication codes
(MACs) —
Part 2:
Mechanisms using a dedicated hash-function
TECHNICAL CORRIGENDUM 1
Clause 4
Add the following at the end of the clause:
⌈ ⌉
𝑥𝑥 the smallest integer greater than or equal to the real number 𝑥𝑥
6.2.2
Replace the first sentence with the following:
If 𝐾𝐾 is shorter than 128 bits, concatenate 𝐾𝐾 to itself ⌈128/𝑘𝑘⌉ times and select the leftmost 128 bits of the
result to form the 128-bit key 𝐾𝐾′:
Replace the last equation with the following:
[ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ]
𝐾𝐾 =𝐾𝐾 0 ∥𝐾𝐾 1 ∥𝐾𝐾 2 ∥𝐾𝐾 3 ∥𝐾𝐾 4 ∥𝐾𝐾 5 ∥𝐾𝐾 6 ∥𝐾𝐾 7
1 1 1 1 1 1 1 1 1
6.4.2
Replace the last line with the following:
′
𝐶𝐶 =𝐾𝐾 [1] (64≤𝑖𝑖≤ 79)
𝑖𝑖 1
6.4.3
Replace the last line with the following:
′
𝐶𝐶 =𝐾𝐾 [3] (48≤𝑖𝑖≤ 63)
𝑖𝑖
6.4.5
Replace the first sentence with the following:
The 128-bit constant strings 𝑇𝑇 for dedicated hash-function 4 are defined as follows (in hexadecimal
𝑖𝑖
representation):
6.4.6
Replace the first sentence with the following:
© ISO/IEC 2024 – All rights
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
The 128-bit constant strings 𝑇𝑇 for dedicated hash-function 5 are defined as follows (in hexadecimal
𝑖𝑖
representation):
6.4.7
Replace the first sentence with the following:
The 128-bit constant stri
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...