UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC DIS 9797-2

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 September 2020
Status: active
Page Count: 58
ICS Code (IT Security): 35.030
scope:

This document specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner.

NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6 [5].

Document History

ISO/IEC DIS 9797-2
September 1, 2020
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
This document specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity...
May 1, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used...
May 1, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
— This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be...
June 1, 2002
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms Using a Dedicated Hash-Function
A description is not available for this item.

References

Advertisement