ISO/IEC-9797-2 Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

ISO/IEC-9797-2 - 3RD EDITION - CURRENT -- See the following: ISO/IEC-9797
Show Complete Document History

Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:


This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.

NOTE       A general framework for the provision of integrity services is specified in ISO/IEC 10181â..6.

ORDER

Price:

$242.50        


Want this as a site license?

To find similar documents by classification:

35.030 (IT Security Including encryption)

35.040 (Character sets and information coding Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.)

This document comes with our free Notification Service, good for the life of the document.

This document is available in either Paper or PDF format.

Document Number

ISO/IEC 9797-2:2021

Revision Level

3RD EDITION

Status

Current

Publication Date

June 1, 2021

Committee Number

ISO/IEC JTC 1/SC 27