Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $250.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.

NOTE°°°°°° A general framework for the provision of integrity services is specified in ISO/IEC°10181°°°6.

 

Document History

  1. ISO/IEC 9797-2:2021

    👀 currently
    viewing


    Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Most Recent
  2. ISO/IEC 9797-2:2011


    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Historical Version
  3. ISO/IEC 9797-2:2002


    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Historical Version