Published
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
WITHDRAWN
ISO/IEC 9797-2:2011
PUBLISHED
ISO/IEC 9797-2:2021
90.20
Standard under periodical review
Apr 15, 2026
PUBLISHED
ISO/IEC 9797-2:2021/Cor 1:2024
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
90.20 Standard under periodical review
To view the full content, you need to register or to log in to your account by clicking on the "Log in" button