ISO IEC 9797-2-2021 cor1-2024 PDF

St ISO IEC 9797-2-2021 cor1-2024

Name in English:
St ISO IEC 9797-2-2021 cor1-2024

Name in Russian:
Ст ISO IEC 9797-2-2021 cor1-2024

Description in English:

Original standard ISO IEC 9797-2-2021 cor1-2024 in PDF full version. Additional info + preview on request

Description in Russian:
Оригинальный стандарт ISO IEC 9797-2-2021 cor1-2024 в PDF полная версия. Дополнительная инфо + превью по запросу
Document status:
Active

Format:
Electronic (PDF)

Delivery time (for English version):
1 business day

Delivery time (for Russian version):
365 business days

SKU:
stiso26849

Choose Document Language:
€25

Full title and description

ISO/IEC 9797-2:2021/Cor 1:2024 — Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1. This corrigendum issues technical and editorial corrections that apply to the ISO/IEC 9797-2:2021 edition (Part 2 of the ISO/IEC 9797 MAC series).

Abstract

The underlying ISO/IEC 9797-2:2021 standard specifies message authentication code (MAC) algorithms that use a secret key together with a dedicated hash-function (or its round/sponge function) to compute an m‑bit MAC for data-integrity verification. The 2024 corrigendum corrects and clarifies items in the 2021 text to ensure unambiguous implementation and referencing.

General information

  • Status: Published.
  • Publication date: 28 November 2024 (corrigendum publication; applies to ISO/IEC 9797-2:2021).
  • Publisher: International Organization for Standardization (ISO) in conjunction with IEC / JTC 1/SC 27.
  • ICS / categories: 35.030 (IT security techniques).
  • Edition / version: Edition 3 (base standard ISO/IEC 9797-2:2021; corrigendum document is the 2024 Technical Corrigendum 1).
  • Number of pages: Corrigendum document: 3 pages. (Base standard ISO/IEC 9797-2:2021 is 52 pages.)

Scope

This Technical Corrigendum 1 provides corrections and editorial clarifications to ISO/IEC 9797-2:2021. The base Part 2 standard defines MAC mechanisms built on dedicated hash-functions (including use of hash round-functions or sponge constructions) and specifies algorithm variants, output lengths, truncation rules and associated security considerations; the corrigendum updates the 2021 text to correct errors and remove ambiguities that could affect implementation or interoperability.

Key topics and requirements

  • Definition of MAC mechanisms that use a dedicated hash-function, including permitted constructions and options.
  • Specification of keying and input processing (how the secret key is combined with the input to produce a keyed-hash MAC).
  • Truncation and output-length rules for producing an m‑bit authentication tag.
  • Security considerations and guidance on algorithm selection, parameter choices and expected resistance properties.
  • Normative references and editorial fixes to ensure consistent interpretation and to correct any errors in the 2021 text (applied by the 2024 corrigendum).

Typical use and users

Users: cryptographic engineers, protocol designers, software and hardware implementers of MACs, security architects, evaluators and conformity assessors, and standards developers. Typical uses: specifying or implementing keyed-hash MACs for message integrity and authenticity in protocols, secure storage and secure communications where a dedicated hash-function based MAC is required.

Related standards

ISO/IEC 9797 series (Part 1: mechanisms using a block cipher; Part 3: mechanisms using a universal hash-function), ISO/IEC 10118 (hash-functions, including dedicated hash‑functions), and other JTC 1/SC 27 information-security standards. The corrigendum is explicitly linked to ISO/IEC 9797-2:2021.

Keywords

Message Authentication Code, MAC, keyed-hash, dedicated hash-function, keyed-hash MAC, truncation, message integrity, ISO/IEC 9797-2, corrigendum.

FAQ

Q: What is this standard?

A: It is the Technical Corrigendum 1 (2024) to ISO/IEC 9797-2:2021, which issues corrections and clarifications to the Part 2 standard for MAC mechanisms that use a dedicated hash-function.

Q: What does it cover?

A: The base Part 2 standard covers the specification of keyed-hash MAC algorithms (how a secret key and a dedicated hash-function or its internal function are used to compute an m‑bit MAC), choices for output length and truncation, and security considerations; the corrigendum fixes errors and clarifies the 2021 wording to ensure accurate implementation.

Q: Who typically uses it?

A: Cryptographers, implementers of security protocols (software/hardware), security architects, auditors and testing laboratories, and standards bodies that reference MAC algorithms for product or protocol specifications.

Q: Is it current or superseded?

A: The corrigendum was published in November 2024 and applies to the current 2021 edition of ISO/IEC 9797-2; it does not supersede the base standard but amends and corrects the 2021 text. As of the corrigendum publication (28 November 2024) the corrected 2021 edition remains the active Part 2 document.

Q: Is it part of a series?

A: Yes — ISO/IEC 9797 is a multi-part series on Message Authentication Codes: Part 1 (block-cipher mechanisms), Part 2 (dedicated hash-function mechanisms — this document), and Part 3 (universal hash-function mechanisms), maintained by JTC 1/SC 27.

Q: What are the key keywords?

A: MAC, message authentication code, keyed-hash, dedicated hash-function, tag truncation, message integrity, ISO/IEC 9797-2, corrigendum.