JIS-X-5055-2-2003-ENG.pdf

上传人:来看看 文档编号:3786519 上传时间:2019-09-23 格式:PDF 页数:27 大小:1.32MB
返回 下载 相关 举报
JIS-X-5055-2-2003-ENG.pdf_第1页
第1页 / 共27页
JIS-X-5055-2-2003-ENG.pdf_第2页
第2页 / 共27页
JIS-X-5055-2-2003-ENG.pdf_第3页
第3页 / 共27页
JIS-X-5055-2-2003-ENG.pdf_第4页
第4页 / 共27页
JIS-X-5055-2-2003-ENG.pdf_第5页
第5页 / 共27页
亲,该文档总共27页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《JIS-X-5055-2-2003-ENG.pdf》由会员分享,可在线阅读,更多相关《JIS-X-5055-2-2003-ENG.pdf(27页珍藏版)》请在三一文库上搜索。

1、J IS JAPANESE I N DUSTR IAL STANDARD Translated and Published by Japanese Standards Association TIS X 5055-2 :zoo3 (ISO/IEC 9797-2 : 2002) Information technology- Security techniques-Message Authentication Codes (MACs)- Part 2 : Mechanisms using a dedicated hash-function ICs 35.040 Reference number

2、: JIS X 5055-2 : 2003 (E) PROTECTED BY COPYRIGHT 15 S Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- X 50

3、55-2 : 2003 (ISO/IEC 9797-2 : 2002) Foreword This translation has been made based on the original Japanese Industrial Standard established by the Minister of Economy, Trade and Industry through deliberations at the Japanese Industrial Standards Committee based on the Industrial Standardization Law.

4、This establishment is made based on ISO/IEC 9797-2 : 2002 Information technology-Security techniques-Message Authentication Codes (MACs)- Part 2 :Mechanisms using a dedicated hash-function in order to facilitate the comparison between Japanese Industrial Standard and International Standard, the deve

5、lopment of Japanese Industrial Standard identical with International Standard and the proposal of the draft of International Standard based on Japanese Industrial Standard. Attention shall be drawn to the possibility that some parts of this Standard may conflict with a patent right, application for

6、a patent after opening to the public, utility model right or application for registration of utility model after opening to the public which have technical properties. The Minister of Economy, Trade and Industry and the Japanese Industrial Standards Committee are not responsible for identifying the

7、patent right, application for a patent after opening to the public, utility model right or application for registration of utility model after opening to the public which have the said technical properties. JIS X 5055 consists of the following 2 parts under general title Infomation technology-Securi

8、ty techniques-Message Authentication Codes (MACs). Part 1 : Mechanisms using a block cipher Part 2 : Mechanisms using a dedicated hash-function. Date of Establishment: 2003-09-20 Date of Public Notice in Official Gazette: 2003-09-22 Investigated by: Japanese Industrial Standards Committee Standards

9、Board Technical Committee on Information Technology JIS X 5055-2 : 2003, First English edition published in 2004-02 Translated and published by: Japanese Standards Association 4-1-24, Akasaka, Minato-ku, Tokyo, 107-8440 JAPAN In the event of any doubts arising as to the contents, the original JIS is

10、 to be the final authority. O JSA 2004 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher. Printed in

11、Japan PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- X 5055-2 : 2003 (ISODEC 9797-

12、2 : 2002) Contents Page Introduction . 1 Scope 1 Normative references 2 Definitions 2 Symbols and notation . 2 Requirements . 2 MAC Algorithm 1 2 MAC Algorithm 2 2 MAC Algorithm 3 2 Annex A (informative) Examples . 2 Annex B (informative) A security analysis of the MAC algorithms . 2 Bibliography .

13、2 Annex 1 (informative) ISO/IEC 9797-2 : 2002 . 3 (i) PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without lice

14、nse from IHS -,-,- JAPANESE INDUSTRIAL STANDARD JIS X 5055-2 : 2003 (ISO/IEC 9797-2 : 2002) Information technology- Security techniques- Message Authentication Codes (MAC$)- Part 2 : Mechanisms using a dedicated hash-function Introduction This Japanese Industrial Standard has been prepared by summa-

15、 rizing the first edition of ISO/IEC 9797-2 Information technology-Security tech- niques-Message Authentication Codes (MACs)-Part 2 : Mechanisms using a dedicated hash-function published in 2002 without any modification in technical contents. For clause 1, the same clause of the original Internation

16、al Standard is entirely adopted, and for clause 2 and subsequent clauses, the contents of the same clause of the original International Standard are referred to them, respectively. 1 Scope This Standard specifies three MAC algorithms that use a secret key and a hash-function (or its round-function)

17、with an n-bit result to calculate an rn-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an enti

18、ty in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) K and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the le

19、ngth (in bits) m of the MAC, and on the specific mechanism. The three mechanisms specified in this Standard are based on the dedicated hash- functions specified in JIS X 5057-3. The first mechanism is commonly known as MDx-MAC. It calls the complete hash-function once, but it makes a small modifica-

20、 tion to the round-function by adding a key to the additive constants in the round- function. The second mechanism is commonly known as HMAC. It calls the complete hash-function twice. The third mechanism is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It offers a

21、higher performance for appli- cations that work with short input strings only. This Standard can be applied to the security services of any security architec- ture, process, or application. Note : The corresponding International Standard to this Standard is as follows: In addition, symbols which den

22、ote the degree of correspondence in the content between the relevant International Standard and JI$ are IDT (iden- tical), MOD (modified), and NEQ (not equivalent) according to ISO/IEC Guide 21. ISO/IEC 9797-2 : 2002 Information technology-Security techniques- Message Authentication Codes (MAC$-Part

23、 2 : Mechanisms using a dedicated hash-function (IDT) PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without lice

24、nse from IHS -,-,- 2 X 5055-2 : 2003 (ISODEC 9797-2 2002) 2 Normative references Clause 2 Normative references of ISO/IEC 9797-2 : 2002, The normative references shall be in accordance with 3 Definitions The definitions shall be in accordance with Clause 3 Terms and defi- nitions of ISO/IEC 9797-2 :

25、 2002. 4 Symbols and notation Clause 4 Symbols and notation of ISO/IEC 9797-2 : 2002. The symbols and notation shall be in accordance with 5 Requirements The requirements shall be in accordance with Clause 5 Require- ments of ISO/IEC 9797-2 : 2002. 6 MAC Algorithm 1 MAC Algorithm 1 of ISO/IEC 9797-2

26、 : 2002. The MAC Algorithm 1 shall be in accordance with Clause 6 7 MAC Algorithm 2 The MAC Algorithm 2 shall be in accordance with Clause 7 MAC Algorithm 2 of ISO/IEC 9797-2 : 2002. 8 MAC Algorithm 3 The MAC Algorithm 3 shall be in accordance with Clause 8 MAC Algorithm 3 of ISO/IEC 9797-2 : 2002.

27、Annex A (informative) Annex A (informative) Examples of ISO/IEC 9797-2 : 2002. Examples The examples shall be in accordance with Annex 3 (informative) A security analysis of the MAC algorithms The se- curity analysis of the MAC algorithms shall be in accordance with Annex B (infor- mative) A securit

28、y analysis of the MAC algorithms of ISO/IEC 9797-2 : 2002. Bibliography The bibliography shall be in accordance with Bibliography of ISO/ IEC 9797-2 : 2002. PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=W

29、ing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 3 X 5055-2 : 2003 (ISO/IEC 9797-2 : 2002) Annex 1 (informative) ISO/IEC 9797-2 : 2002 Information technology-Security techniques-Message Authentication Codes (MACSI-Part 2 : Mech

30、anisms using a dedicated hash-function. This Annex (informative) does not constitute provisions of this Standard. PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:5

31、4:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 4 X 5055-2 2003 (ISO/IEC 9797-2 : 2002) INTERNATIONAL STANDARD ISOIIEC 9797-2 First edition 2002-06-01 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedica

32、ted has h -f u n ct i on Technologies de linformation - Techniques de scurit - Codes dauthentification de message (MAC) - Partie 2: Mcanismes utilisant une fonction de hachage Reference number I SOA EC 9797-2:2002(E) 0 ISOAEC 2002 PROTECTED BY COPYRIGHT Copyright Japanese Standards Association Provi

33、ded by IHS under license with JSALicensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 5 X 5055-2 : 2003 (ISODEC 9797-2 : 2002) ISOIIEC 9797-2:2002( E) PDF disclaimer This PDF file may contai

34、n embedded typefaces In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing In downloading this file. parties accept therein the responsibility

35、 of not infringing Adobes licensing policy. The IS0 Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation paramet

36、ers were optimized for printing. Every care has been taken to ensure that the file is suitable for use by IS0 member bodies. In the unlikely event that a problem relating to it is found. please inform the Central Secretariat at the address given below. Q ISOIIEC 2002 All rights resewed. Unless other

37、wise specified, no part of this publication may be reproduced or utilized in any form or by any means, ekctronic or mechanical, including photocopying and microfilm, without permission in writing from either IS0 at the address below or ISOs member body in the country of the requester. IS0 copyright

38、office Case postale 56 Y CH-I21 1 Geneva 20 Tel. + 41 22 749 O 1 11 Fax +41227490947 E-mail copyrightiso.ch Web www.ico.ch Printed in Switzerland PROTECTED BY COPYRIGHT O ISOIIEC 2002 -All rights reserved Copyright Japanese Standards Association Provided by IHS under license with JSALicensee=IHS Emp

39、loyees/1111111001, User=Wing, Bernie Not for Resale, 03/14/2007 08:54:59 MDTNo reproduction or networking permitted without license from IHS -,-,- 6 X 5055-2 2003 (ISO/IEC 9797-2 : 2002) ISOIIEC 9797-2:2002(E) Contents 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbols and notati

40、on 2 5 Requirements 3 6 MAC Algorithm 1 3 6.1 Description of MAC Algorithm 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.2 Step 2 (modification of

41、the constants and the IV) . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.3 Step 3 (hashing operation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.1.4 Step 4 (output transformation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

42、G.i.5 Step 6 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.2 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 6.3 Computation of the constants . . . . . . . . . . . . . . . .

43、. . . . . . . . . . . . . . . . . . . . . . . . . 4 6.3.1 Dedicated Hash-Function 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6.3.2 Dedicated Hash-Function 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6.3.3 Dedicated Hash-Functio

44、n 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 7 MAC Algorithm 2 5 .1 Description of MAC Algorithm 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 7.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . .

45、 . . . . . . . . . . . . . 6 7.1.2 Step 2 (hashing operation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 7.1.3 Step 3 (output transforrnation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 .2 Efficiency . . . . . . . . . . . . . . . . . .

46、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8 MAC Algorithm 3 6 8.1 Description of MAC Algorithm 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8.1.1 Step 1 (key expansion) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

47、 . . . . . . . . 6 7.1.4 Step 4 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8.1.2 Step 2 (modification of the constants and the IV) . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.3 Step 3 (padding) . . . . . . . . . . . . . . . . . .

48、. . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.5 Step 5 (truncation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1.4 Step 4 (application of the i-ound-function) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.2 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 O ISOIIEC 2002 -All rights reserved PROTECTED BY COPYRIGHT iii Copyright Japanese Standards Association Provided by IHS under license with JSA

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1