![header thumbnail](/images/publishers\iti_cover.gif)
INCITS/ISO/IEC 9797-2 : 2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
![header thumbnail](/images/publishers\iti_cover.gif)
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
Hardcopy , PDF
24-04-2024
English
01-01-2012
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 MAC Algorithm 1
7 MAC Algorithm 2
8 MAC Algorithm 3
Annex A (normative) - ASN 1 Module
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the MAC algorithms
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.