JavacardOS will not accept order any more, please contact our partner Feitian online Store:
https://ftsafe.en.alibaba.com/index.html
https://ftsafe.en.alibaba.com/index.html
ISO/IEC 9797-1
ISO/IEC 9797-1
Can anyone explain me ISO/IEC 9797-1 MAC Algorithm 1?
TIA.
TIA.
Re: ISO/IEC 9797-1
MAC Algorithm 1 works like the CBC mode of block cipher, with the IV equals to zero.
Step 1 (padding): there are three methods to choose, any one is okay.
Step 2 (splitting): split the padded data to q blocks D1,...,Dq.
Step 3 (initial transformation): using the block cipher key K to encrypt the first block D1.
Step 4 (iteration): this iteration process is same with the CBC mode of block cipher.
Step 5 (output transfromation): this output transformation is the identity function, do not need do anything.
Step 6 (truncation): taking leftmost bits your MAC length need.
Step 1 (padding): there are three methods to choose, any one is okay.
Step 2 (splitting): split the padded data to q blocks D1,...,Dq.
Step 3 (initial transformation): using the block cipher key K to encrypt the first block D1.
Step 4 (iteration): this iteration process is same with the CBC mode of block cipher.
Step 5 (output transfromation): this output transformation is the identity function, do not need do anything.
Step 6 (truncation): taking leftmost bits your MAC length need.
Re: ISO/IEC 9797-1
MAC Algorithm 1 works like the CBC mode of block cipher, with the IV equals to zero.
Step 1 (padding): there are three methods to choose, any one is okay.
Step 2 (splitting): split the padded data to q blocks D1,...,Dq.
Step 3 (initial transformation): using the block cipher key K to encrypt the first block D1.
Step 4 (iteration): this iteration process is same with the CBC mode of block cipher.
Step 5 (output transfromation): this output transformation is the identity function, do not need do anything.
Step 6 (truncation): taking leftmost bits your MAC length need.
Step 1 (padding): there are three methods to choose, any one is okay.
Step 2 (splitting): split the padded data to q blocks D1,...,Dq.
Step 3 (initial transformation): using the block cipher key K to encrypt the first block D1.
Step 4 (iteration): this iteration process is same with the CBC mode of block cipher.
Step 5 (output transfromation): this output transformation is the identity function, do not need do anything.
Step 6 (truncation): taking leftmost bits your MAC length need.
Who is online
Users browsing this forum: No registered users and 42 guests