ISO/IEC 9797-2
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms Using a Dedicated Hash-Function
inactive
Buy Now
Organization: | ISO |
Publication Date: | 1 June 2002 |
Status: | inactive |
Page Count: | 22 |
ICS Code (Information coding): | 35.040 |
Document History

June 1, 2021
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity...

May 1, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used...

May 1, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
— This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be...

ISO/IEC 9797-2
June 1, 2002
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms Using a Dedicated Hash-Function
A description is not available for this item.