Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • 👥
    • Immediate download
    • $368.30
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $368.30
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $497.84
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.

NOTE   A general framework for the provision of integrity services is specified in ISO/IEC 10181-6. 

All current amendments available at time of purchase are included with the purchase of this document.

 

Document History

  1. BS ISO/IEC 9797-2:2021

    👀 currently
    viewing


    Information security. Message authentication codes (MACs)-Mechanisms using a dedicated hash-function

    • Most Recent
  2. BS ISO/IEC 9797-2:2011


    Information technology. Security techniques. Message Authentication Codes (MACs)-Mechanisms using a dedicated hash-function

    • Historical Version
  3. BS 08/30135059 DC


    BS ISO/IEC 9797-2. Information technology. Security techniques. Message authentication codes (MACs). Part 2. Mechanisms using a dedicated hash-function

    • Historical Version
  4. BS ISO/IEC 9797-2:2002


    Information technology. Security techniques. Message authentication codes (MACs)-Mechanisms using a dedicated hash-function

    • Historical Version