ISO/IEC 9797-2:2021/Cor 1:2024
(Corrigendum)Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1
Sécurité de l'information — Codes d'authentication de message (MAC) — Partie 2: Mécanismes utilisant une fonction de hachage dédiée — Rectificatif technique 1
General Information
Relations
Standards Content (Sample)
International
Standard
ISO/IEC 9797-2
Third edition
Information security — Message
2021-06
authentication codes (MACs)
Part 2:
TECHNICAL
Mechanisms using a dedicated hash-
CORRIGENDUM 1
function
2024-11
TECHNICAL CORRIGENDUM 1
Sécurité de l'information — Codes d'authentication de message
(MAC)
Partie 2:
Mécanismes utilisant une fonction de hachage dédiée
RECTIFICATIF TECHNIQUE 1
Reference number
ISO/IEC 9797-2:2021/Cor.1 :2024(en) © ISO/IEC 2024
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights
ii
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
Technical Corrigendum 1 to ISO/IEC 9797-2:2021 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Information security, cyber security, and privacy protection.
© ISO/IEC 2024 – All rights
iii
Information security — Message authentication codes
(MACs) —
Part 2:
Mechanisms using a dedicated hash-function
TECHNICAL CORRIGENDUM 1
Clause 4
Add the following at the end of the clause:
⌈ ⌉
𝑥𝑥 the smallest integer greater than or equal to the real number 𝑥𝑥
6.2.2
Replace the first sentence with the following:
If 𝐾𝐾 is shorter than 128 bits, concatenate 𝐾𝐾 to itself ⌈128/𝑘𝑘⌉ times and select the leftmost 128 bits of the
result to form the 128-bit key 𝐾𝐾′:
Replace the last equation with the following:
[ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ]
𝐾𝐾 =𝐾𝐾 0 ∥𝐾𝐾 1 ∥𝐾𝐾 2 ∥𝐾𝐾 3 ∥𝐾𝐾 4 ∥𝐾𝐾 5 ∥𝐾𝐾 6 ∥𝐾𝐾 7
1 1 1 1 1 1 1 1 1
6.4.2
Replace the last line with the following:
′
𝐶𝐶 =𝐾𝐾 [1] (64≤𝑖𝑖≤ 79)
𝑖𝑖 1
6.4.3
Replace the last line with the following:
′
𝐶𝐶 =𝐾𝐾 [3] (48≤𝑖𝑖≤ 63)
𝑖𝑖
6.4.5
Replace the first sentence with the following:
The 128-bit constant strings 𝑇𝑇 for dedicated hash-function 4 are defined as follows (in hexadecimal
𝑖𝑖
representation):
6.4.6
Replace the first sentence with the following:
© ISO/IEC 2024 – All rights
ISO/IEC 9797-2:2021/Cor. 1:2024(en)
The 128-bit constant strings 𝑇𝑇 for dedicated hash-function 5 are defined as follows (in hexadecimal
𝑖𝑖
representation):
6.4.7
Replace the first sentence with the following:
The 128-bit constant stri
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.