Message authentication code standards are published by ISO and IEC. They include the ISO/IEC 9797 series, which covers mechanisms of block ciphers and hash functions.
ISO/IEC 9797-1:2011 specifies six MAC algorithms that use a secret key and an n -bit block cipher to calculate an m -bit MAC. ISO/IEC 9797-1:2011 can be applied to the security services of any security architecture, process, or application. Key management mechanisms are outside the scope of ISO/IEC 9797-1:2011. ISO/IEC 9797-1:2011 specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m -bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner. NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
ISO/IEC 9797-3:2011 specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n -bit result to calculate an m -bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4: UMAC; Badger; Poly1305-AES; GMAC.