M00009647
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION
Canadian Standards Association
In stock
Warning: Last items in stock!
Availability date: 10/28/2021
Foreword <br>Introduction<br>1 Scope<br>2 Normative references<br>3 Terms and definitions<br>4 Symbols and notation<br>5 Requirements<br>6 MAC Algorithm 1<br>7 MAC Algorithm 2<br>8 MAC Algorithm 3<br>Annex A (normative) - ASN.1 Module<br>Annex B (informative) - Examples<br>Annex C (informative) - A security analysis of the <br> MAC algorithms<br>Bibliography
Describes three MAC algorithms that use a secret key and a hash-function with an n-bit result to calculate an m-bit MAC.
Published | |
Document Type | Standard |
Status | Current |
Publisher | Canadian Standards Association |
ProductNote | Reconfirmed EN |
Pages | |
ISBN |