This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.
Status: PublishedPublication date: 2021-06
Edition: 3Number of pages: 52
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
Buy this standard
|std 1 178||PDF + ePub|
|std 2 178||Paper|