Abstract
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
Read sample
Preview this standard in our Online Browsing Platform (OBP)
General information
-
Status: PublishedPublication date: 2021-06Stage: International Standard published [60.60]
-
Edition: 3Number of pages: 52
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Life cycle
-
Previously
WithdrawnISO/IEC 9797-2:2011
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda / Amendments
Under developmentISO/IEC 9797-2:2021/CD Cor 1
-
00
Got a question?
Check out our FAQs
Customer care
+41 22 749 08 88
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)