IEC - International Electrotechnical Commission - ISO/IEC 9797-2:2002

Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function

revised
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 13 June 2002
Status: revised
Page Count: 14
ICS Code (IT Security): 35.030
abstract:

ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as... View More

Document History

May 9, 2011
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Message Authentication Code (MAC) algorithms are data integrity mechanisms that compute a short string (the Message Authentication Code or MAC) as a complex function of every bit of the data and of a...
ISO/IEC 9797-2:2002
June 13, 2002
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as...
Advertisement