ISO/IEC-9797-2 › Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
ISO/IEC-9797-2
-
3RD EDITION
-
CURRENT
-- See the following:
ISO/IEC-9797
Show Complete Document History
Show Complete Document History
Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:
The following bibliographic material is provided to assist you with your purchasing decision:
Included in this current edition are the following subparts:
3RD EDITION - June 1, 2021
3RD EDITION CORRIGENDUM 1 - Nov. 1, 2024
3RD EDITION CORRIGENDUM 1 - Nov. 1, 2024
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181â..6.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Document Number
ISO/IEC 9797-2:2021
Revision Level
3RD EDITION
Status
Current
Publication Date
June 1, 2021
Committee Number
ISO/IEC JTC 1/SC 27