Abstract Preview

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.

NOTE       A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.


General information

  • Status :  Published
    Publication date : 2021-06
  • Edition : 3
    Number of pages : 52
  • :
    ISO/IEC JTC 1/SC 27
    Information security, cybersecurity and privacy protection
  • 35.030
    IT Security

Buy this standard

Format Language
PDF + ePub
Paper
  • CHF178

Got a question?

Check out our FAQs

Customer care
+41 22 749 08 88

Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)

Keep up to date with ISO

Sign up to our newsletter for the latest news, views and product information.