《JIS-X-5055-2-2003-ENG.pdf》由会员分享,可在线阅读,更多相关《JIS-X-5055-2-2003-ENG.pdf(27页珍藏版)》请在三一文库上搜索。
1、J IS JAPANESE I N DUSTR IAL STANDARD Translated and Published by Japanese Standards Association TIS X 5055-2 :zoo3 (ISO/IEC 9797-2 : 2002) Information technology- Security techniques-Message Authentication Codes (MACs)- Part 2 : Mechanisms using a dedicated hash-function ICs 35.040 Reference number
2、: JIS X 5055-2 : 2003 (E) PROTECTED BY COPYRIGHT 15 S Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- X 50
3、55-2 : 2003 (ISO/IEC 9797-2 : 2002) Foreword This translation has been made based on the original Japanese Industrial Standard established by the Minister of Economy, Trade and Industry through deliberations at the Japanese Industrial Standards Committee based on the Industrial Standardization Law.
4、This establishment is made based on ISO/IEC 9797-2 : 2002 Information technology-Security techniques-Message Authentication Codes (MACs)- Part 2 :Mechanisms using a dedicated hash-function in order to facilitate the comparison between Japanese Industrial Standard and International Standard, the deve
5、lopment of Japanese Industrial Standard identical with International Standard and the proposal of the draft of International Standard based on Japanese Industrial Standard. Attention shall be drawn to the possibility that some parts of this Standard may conflict with a patent right, application for
6、a patent after opening to the public, utility model right or application for registration of utility model after opening to the public which have technical properties. The Minister of Economy, Trade and Industry and the Japanese Industrial Standards Committee are not responsible for identifying the
7、patent right, application for a patent after opening to the public, utility model right or application for registration of utility model after opening to the public which have the said technical properties. JIS X 5055 consists of the following 2 parts under general title Infomation technology-Securi
8、ty techniques-Message Authentication Codes (MACs). Part 1 : Mechanisms using a block cipher Part 2 : Mechanisms using a dedicated hash-function. Date of Establishment: 2003-09-20 Date of Public Notice in Official Gazette: 2003-09-22 Investigated by: Japanese Industrial Standards Committee Standards
9、Board Technical Committee on Information Technology JIS X 5055-2 : 2003, First English edition published in 2004-02 Translated and published by: Japanese Standards Association 4-1-24, Akasaka, Minato-ku, Tokyo, 107-8440 JAPAN In the event of any doubts arising as to the contents, the original JIS is
10、 to be the final authority. O JSA 2004 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher. Printed in
11、Japan PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- X 5055-2 : 2003 (ISODEC 9797-
12、2 : 2002) Contents Page Introduction . 1 Scope 1 Normative references 2 Definitions 2 Symbols and notation . 2 Requirements . 2 MAC Algorithm 1 2 MAC Algorithm 2 2 MAC Algorithm 3 2 Annex A (informative) Examples . 2 Annex B (informative) A security analysis of the MAC algorithms . 2 Bibliography .
13、2 Annex 1 (informative) ISO/IEC 9797-2 : 2002 . 3 (i) PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without lice
14、nse from IHS -,-,- JAPANESE INDUSTRIAL STANDARD JIS X 5055-2 : 2003 (ISO/IEC 9797-2 : 2002) Information technology- Security techniques- Message Authentication Codes (MAC$)- Part 2 : Mechanisms using a dedicated hash-function Introduction This Japanese Industrial Standard has been prepared by summa-
15、 rizing the first edition of ISO/IEC 9797-2 Information technology-Security tech- niques-Message Authentication Codes (MACs)-Part 2 : Mechanisms using a dedicated hash-function published in 2002 without any modification in technical contents. For clause 1, the same clause of the original Internation
16、al Standard is entirely adopted, and for clause 2 and subsequent clauses, the contents of the same clause of the original International Standard are referred to them, respectively. 1 Scope This Standard specifies three MAC algorithms that use a secret key and a hash-function (or its round-function)
17、with an n-bit result to calculate an rn-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an enti
18、ty in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) K and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the le
19、ngth (in bits) m of the MAC, and on the specific mechanism. The three mechanisms specified in this Standard are based on the dedicated hash- functions specified in JIS X 5057-3. The first mechanism is commonly known as MDx-MAC. It calls the complete hash-function once, but it makes a small modifica-
20、 tion to the round-function by adding a key to the additive constants in the round- function. The second mechanism is commonly known as HMAC. It calls the complete hash-function twice. The third mechanism is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It offers a
21、higher performance for appli- cations that work with short input strings only. This Standard can be applied to the security services of any security architec- ture, process, or application. Note : The corresponding International Standard to this Standard is as follows: In addition, symbols which den
22、ote the degree of correspondence in the content between the relevant International Standard and JI$ are IDT (iden- tical), MOD (modified), and NEQ (not equivalent) according to ISO/IEC Guide 21. ISO/IEC 9797-2 : 2002 Information technology-Security techniques- Message Authentication Codes (MAC$-Part
23、 2 : Mechanisms using a dedicated hash-function (IDT) PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without lice
24、nse from IHS -,-,- 2 X 5055-2 : 2003 (ISODEC 9797-2 2002) 2 Normative references Clause 2 Normative references of ISO/IEC 9797-2 : 2002, The normative references shall be in accordance with 3 Definitions The definitions shall be in accordance with Clause 3 Terms and defi- nitions of ISO/IEC 9797-2 :
25、 2002. 4 Symbols and notation Clause 4 Symbols and notation of ISO/IEC 9797-2 : 2002. The symbols and notation shall be in accordance with 5 Requirements The requirements shall be in accordance with Clause 5 Require- ments of ISO/IEC 9797-2 : 2002. 6 MAC Algorithm 1 MAC Algorithm 1 of ISO/IEC 9797-2
26、 : 2002. The MAC Algorithm 1 shall be in accordance with Clause 6 7 MAC Algorithm 2 The MAC Algorithm 2 shall be in accordance with Clause 7 MAC Algorithm 2 of ISO/IEC 9797-2 : 2002. 8 MAC Algorithm 3 The MAC Algorithm 3 shall be in accordance with Clause 8 MAC Algorithm 3 of ISO/IEC 9797-2 : 2002.
27、Annex A (informative) Annex A (informative) Examples of ISO/IEC 9797-2 : 2002. Examples The examples shall be in accordance with Annex 3 (informative) A security analysis of the MAC algorithms The se- curity analysis of the MAC algorithms shall be in accordance with Annex B (infor- mative) A securit
28、y analysis of the MAC algorithms of ISO/IEC 9797-2 : 2002. Bibliography The bibliography shall be in accordance with Bibliography of ISO/ IEC 9797-2 : 2002. PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=W
29、ing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 3 X 5055-2 : 2003 (ISO/IEC 9797-2 : 2002) Annex 1 (informative) ISO/IEC 9797-2 : 2002 Information technology-Security techniques-Message Authentication Codes (MACSI-Part 2 : Mech
30、anisms using a dedicated hash-function. This Annex (informative) does not constitute provisions of this Standard. PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:5
31、4:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 4 X 5055-2 2003 (ISO/IEC 9797-2 : 2002) INTERNATIONAL STANDARD ISOIIEC 9797-2 First edition 2002-06-01 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedica
32、ted has h -f u n ct i on Technologies de linformation - Techniques de scurit - Codes dauthentification de message (MAC) - Partie 2: Mcanismes utilisant une fonction de hachage Reference number I SOA EC 9797-2:2002(E) 0 ISOAEC 2002 PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provi
33、ded by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 5 X 5055-2 : 2003 (ISODEC 9797-2 : 2002) ISOIIEC 9797-2:2002( E) PDF disclaimer This PDF file may contai
34、n embedded typefaces In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing In downloading this file. parties accept therein the responsibility
35、 of not infringing Adobes licensing policy. The IS0 Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation paramet
36、ers were optimized for printing. Every care has been taken to ensure that the file is suitable for use by IS0 member bodies. In the unlikely event that a problem relating to it is found. please inform the Central Secretariat at the address given below. Q ISOIIEC 2002 All rights resewed. Unless other
37、wise specified, no part of this publication may be reproduced or utilized in any form or by any means, ekctronic or mechanical, including photocopying and microfilm, without permission in writing from either IS0 at the address below or ISOs member body in the country of the requester. IS0 copyright
38、office Case postale 56 Y CH-I21 1 Geneva 20 Tel. + 41 22 749 O 1 11 Fax +41227490947 E-mail copyrightiso.ch Web www.ico.ch Printed in Switzerland PROTECTED BY COPYRIGHT O ISOIIEC 2002 -All rights reserved Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Emp
39、loyees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 6 X 5055-2 2003 (ISO/IEC 9797-2 : 2002) ISOIIEC 9797-2:2002(E) Contents 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbols and notati
40、on 2 5 Requirements 3 6 MAC Algorithm 1 3 6.1 Description of MAC Algorithm 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.2 Step 2 (modification of
41、the constants and the IV) . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.3 Step 3 (hashing operation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.4 Step 4 (output transformation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
42、G.i.5 Step 6 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.2 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.3 Computation of the constants . . . . . . . . . . . . . . . .
43、. . . . . . . . . . . . . . . . . . . . . . . . . 4 6.3.1 Dedicated Hash-Function 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6.3.2 Dedicated Hash-Function 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6.3.3 Dedicated Hash-Functio
44、n 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 7 MAC Algorithm 2 5 .1 Description of MAC Algorithm 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 7.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45、 . . . . . . . . . . . . . 6 7.1.2 Step 2 (hashing operation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 7.1.3 Step 3 (output transforrnation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 .2 Efficiency . . . . . . . . . . . . . . . . . .
46、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8 MAC Algorithm 3 6 8.1 Description of MAC Algorithm 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47、 . . . . . . . . 6 7.1.4 Step 4 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8.1.2 Step 2 (modification of the constants and the IV) . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.3 Step 3 (padding) . . . . . . . . . . . . . . . . . .
48、. . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.5 Step 5 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.4 Step 4 (application of the i-ound-function) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.2 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 O ISOIIEC 2002 -All rights reserved PROTECTED BY COPYRIGHT iii Copyright Japanese Standards Association Provided by IHS under license with JSA