ISO/IEC 9797-3:2011/Amd 1:2020
(Amendment)Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - Amendment 1
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - Amendment 1
Technologies de l'information — Techniques de sécurité — Codes d'authentification de message (MAC) — Partie 3: Mécanismes utilisant une fonction de hachage universelle — Amendement 1
General Information
- Status
- Published
- Publication Date
- 09-Feb-2020
- Drafting Committee
- ISO/IEC JTC 1/SC 27/WG 2 - Cryptography and security mechanisms
- Current Stage
- 6060 - International Standard published
- Start Date
- 10-Feb-2020
- Due Date
- 19-Jun-2021
- Completion Date
- 10-Feb-2020
Relations
- Effective Date
- 13-Oct-2020
Overview
ISO/IEC 9797-3:2011/Amd 1:2020 is an important amendment to the international standard covering Information Technology Security Techniques specifically focused on Message Authentication Codes (MACs) using universal hash-functions. Published by ISO and IEC, this amendment provides updates and clarifications enhancing the original 2011 standard.
This document is part of the ISO/IEC 9797 series and is prepared by the joint technical committee ISO/IEC JTC 1, Subcommittee SC 27, which specializes in information security, cybersecurity, and privacy protection. The amendment reflects advances in cryptographic mechanisms, especially concerning the usage and configuration of universal hash-function based MAC algorithms like GMAC.
Key Topics
Universal Hash-Function Based MACs: The standard specifies mechanisms for constructing MACs utilizing universal hash functions, which are fundamental for ensuring message integrity and authentication in cryptographic protocols.
GMAC Algorithm Updates: The amendment revises the specifications for GMAC:
- GMAC is applicable with any 128-bit block cipher from ISO/IEC 18033-3.
- Output tag lengths (
t) must be multiples of 8 bits, typically between 96 and 128 bits. - A 64-bit tag length is allowed but only for specialized applications involving voice, video, or data streams where some forgery risks are manageable.
Security Guidance: The document advises caution on using shorter authentication tags (especially 64 bits) due to vulnerabilities to targeted forgery attacks. It emphasizes the importance of selecting tag lengths that balance security and performance needs.
Annex Updates:
- Annex A defines object identifiers for algorithm identification in security protocols.
- Annex B provides practical numerical examples to aid implementers in applying the algorithms correctly.
- Annex C discusses security properties and considerations for the standardized algorithms.
Applications
This amendment supports secure message authentication across various sectors including:
- Cybersecurity Protocols: Enhancing cryptographic integrity checks within secure communication channels.
- Financial Services: Protecting transaction data from tampering using robust MAC algorithms.
- Telecommunications: Enabling authentication for voice and video data streams, with tailored tag lengths for performance-sensitive media.
- IoT and Embedded Systems: Lightweight authentication suitable for constrained environments where universal hash-functions provide efficiency gains.
- Software and Firmware Integrity Verification: Ensuring update authenticity and integrity using standardized MACs.
By specifying updated requirements for MAC tag lengths and algorithm identifiers, the amendment ensures interoperability and secure implementation in line with global standards.
Related Standards
- ISO/IEC 9797 series: Covers other parts detailing MAC algorithms using different cryptographic approaches.
- ISO/IEC 18033-3: Specifies block ciphers suitable for use with GMAC, ensuring compatibility and security in encryption and authentication.
- NIST SP 800-38D: Provides recommendations for Galois/Counter Mode (GCM) and GMAC, referenced for guidance on secure implementation and tag length considerations.
- ISO/IEC Directives Parts 1 and 2: Outline editorial and procedural rules ensuring consistency in international standard development.
Keywords: ISO/IEC 9797-3 Amendment 1, message authentication codes, MAC, universal hash-function, GMAC, cryptographic security, information technology security, ISO cybersecurity standard, tag length, message integrity, authentication algorithms.
Frequently Asked Questions
ISO/IEC 9797-3:2011/Amd 1:2020 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - Amendment 1". This standard covers: Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - Amendment 1
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function - Amendment 1
ISO/IEC 9797-3:2011/Amd 1:2020 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 9797-3:2011/Amd 1:2020 has the following relationships with other standards: It is inter standard links to ISO/IEC 9797-3:2011. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 9797-3:2011/Amd 1:2020 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 9797-3
First edition
2011-11-15
AMENDMENT 1
2020-02
Information technology — Security
techniques — Message Authentication
Codes (MACs) —
Part 3:
Mechanisms using a universal hash-
function
AMENDMENT 1
Technologies de l'information — Techniques de sécurité — Codes
d'authentification de message (MAC) —
Partie 3: Mécanismes utilisant une fonction de hachage universelle
AMENDEMENT 1
Reference number
ISO/IEC 9797-3:2011/Amd.1:2020(E)
©
ISO/IEC 2020
ISO/IEC 9797-3:2011/Amd.1:2020(E)
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
ISO/IEC 9797-3:2011/Amd.1:2020(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that
are members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www. iso. org/d irectives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www. iso. org/p atents) or the IEC
list of patent declarations received (see http://p atents.i ec. ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's ad
...










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...