Objavljen
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
POVUČEN
ISO/IEC 9797-2:2011
OBJAVLJEN
ISO/IEC 9797-2:2021
90.20
Početak postupka preispitivanja standarda
15. 4. 2026.
OBJAVLJEN
ISO/IEC 9797-2:2021/Cor 1:2024
Bezbednost informacija – Kodovi za autentifikaciju poruka (MAC) – Deo 2: Mehanizmi koji koriste dodeljenu heš-funkciju
90.20 Početak postupka preispitivanja standarda
Da biste videli ceo sadržaj, morate se registrovati ili prijaviti pomoću korisničkog imena koje već imate.