CSA ISO/IEC 9797-2:22

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash- function
1 Scope This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner. NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6.
OEN:
CSA
Langue:
English
Code(s) de l'ICS:
35.030
Statut:
Norme
Date de Publication:
2022-02-28
Numéro Standard:
CSA ISO/IEC 9797-2:22