Specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. Can be applied to the security services of any security architecture, process, or application. Key management mechanisms are outside the scope. Specifies object identifiers that can be used to identify each mechanism in accordance with ISO/IEC 8825-1. Numerical examples and a security analysis of each of the six specified algorithms are provided, and the relationship of ISO/IEC 9797-1:2011 to previous standards is explained.