Published
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
WITHDRAWN
SRPS ISO/IEC 9797-2:2018
PUBLISHED
SRPS ISO/IEC 9797-2:2022
90.20
Standard under periodical review
Apr 15, 2026
To view the full content, you need to register or to log in to your account by clicking on the "Log in" button