Abstract
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
General information
-
Status: PublishedPublication date: 2021-06Stage: International Standard published [60.60]
-
Edition: 3Number of pages: 52
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Life cycle
-
Previously
WithdrawnISO/IEC 9797-2:2011
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda
Correct the current edition; free; not included in the text of the existing standard.Under developmentISO/IEC 9797-2:2021/CD Cor 1.2
-
00