accuris store logo
  • Browse all
  • 3A
  • 9000
  • A3
  • A4A
  • AA
  • AAMI
  • AASHTO
  • AATCC
  • ABCB
  • ABMA
  • ABMA-BOILER
  • ACC
  • ACGIH
  • ACI
  • ADA
  • ADS
  • AEIC
  • AENOR
  • AES
  • AFCEN
  • AGA
  • AGMA
  • AHAM
  • AHP
  • AHRI
  • AIA
  • AIAA
  • AICHE
  • AIHA
  • AIIM
  • AISC
  • ALI
  • ALPEMA
  • AMCA
  • ANS
  • ANSI
  • ANSI/ANSLG
  • ANSI/NEMA
  • ANSI/TCNA
  • ANSI/UAMA
  • API
  • APWA
  • AREMA
  • ARINC
  • ARMY
  • AS
  • ASA
  • ASABE
  • ASCE
  • ASD-STAN prEN
  • ASHE
  • ASHRAE
  • ASIS
  • ASM
  • ASME
  • ASNT
  • ASQ
  • ASSE (Plumbing)
  • ASSP
  • ASTM
  • ATIS
  • AVIXA
  • AWC
  • AWI
  • AWPA
  • AWS
  • AWWA
  • B11
  • BHMA
  • BICSI
  • BIFMA
  • BioWorld
  • BMI
  • BS
  • CAN/CGSB
  • CAN/ULC
  • CEI
  • CFR
  • CGA
  • CGSB
  • CIE
  • CII
  • CISPR
  • CLSI
  • CMAA
  • CRANE
  • CRSI
  • CSA
  • CTA
  • CTI
  • DID
  • DIN
  • DNV
  • DOD
  • DOXPUB
  • DVS
  • ECIA
  • EEC
  • EEMUA
  • ESD
  • ETSI
  • FCI
  • FED
  • FM Approvals
  • FORD
  • FRPI
  • GMW
  • GPA
  • HEI
  • HFES
  • HI
  • HIR
  • HPS
  • I3A
  • IADC
  • IAPMO
  • IATA
  • ICAO
  • ICC
  • ICEA
  • ICML
  • IEC
  • IEEE
  • IEEE/UL
  • IES
  • IEST
  • IFI
  • IICRC
  • INCITS
  • INTERN
  • IPC
  • ISA
  • ISEA
  • ISO
  • ISO/IEC/IEEE
  • ISPE
  • ISTA
  • ISUZU
  • JEDEC
  • JIS
  • LIA
  • MBMA
  • MCGRAW-HILL
  • MIL
  • MPIF
  • MSS
  • NAAMM
  • NACE
  • NADCA
  • NAS
  • NASA
  • NBBI
  • NCSL
  • NECA
  • NEMA
  • NETA
  • NFPA (Fire)
  • NFPA (Fluid)
  • NFSI
  • NG
  • NGA
  • NISO
  • NORSOK
  • NRC
  • NSC
  • NSF
  • NZS
  • OPEI
  • PCI
  • PDA
  • PEI
  • PIA
  • PIP
  • PPI
  • RTCA
  • SAE
  • SAIA
  • SCTE
  • SDI
  • SES
  • SIA
  • SJI
  • SMACNA
  • SME
  • SMPTE
  • SN EN
  • SPC
  • SPI
  • SSPC
  • STI/SPFA
  • TAPPI
  • TCIA
  • TEMA
  • THHILL
  • TIA
  • TMS
  • UL
  • ULC
  • UOP
  • WILEY
  • WRC
  • X9
Publishers
Need Help?
Log in
Create Account
Cart

Your shopping cart is empty.

Log in or create account

  1. Home
  2. ISO/IEC 9797-2:2002

ISO/IEC 9797-2:2002 Historical

1035924

Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

standard by International Organization for Standardization/International Electrotechnical Commission , 06/01/2002

This document has been replaced. View the most recent version.

Track This

Full Description

ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of a hash-code produced by the hash-function, on the strength of the hash-function, on the length (in bits) m of the MAC, and on the specific mechanism.

The three mechanisms specified in ISO/IEC 9797-2:2002 are based on the dedicated hash-functions specified in ISO/IEC 10118-3. The first mechanism specified in ISO/IEC 9797-2:2002 is commonly known as MDx-MAC. It calls the complete hash-function once, but it makes a small modification to the round-function by adding a key to the additive constants in the round-function. The second mechanism specified in ISO/IEC 9797-2:2002 is commonly known as HMAC. It calls the complete hash-function twice. The third mechanism specified in ISO/IEC 9797-2:2002 is a variant of MDx-MAC that takes as input only short strings (at most 256 bits). It offers a higher performance for applications that work with short input strings only.

ISO/IEC 9797-2:2002 can be applied to the security services of any security architecture, process, or application.

See more

Also Bought By Customers

  • 862931

    ISO/IEC 6429:1992
    Priced From $287.00

  • 1521333

    ISO/IEC 7816-2:2007
    Priced From $84.00

  • 918678

    ISO/IEC TR 13335-4:2000
    Priced From $167.00

  • 1098558

    ISO/IEC 15938-5:2003
    Priced From $287.00

 

Document History

  1. ISO/IEC 9797-2:2021

    June 2021
    Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Most Recent  Most Recent
  2. ISO/IEC 9797-2:2011

    June 2011
    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Historical Version
  3. ISO/IEC 9797-2:2002

    You are currently viewing this product 👀 currently
    viewing

    June 2002
    Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

    • Historical Version

Browse related products from International Organization for Standardization/International Electrotechnical Commission

  • International Organization for Standardization > By ICS Code > 35: Information technology. Office machines > 35.040: Character sets and information coding
  • International Organization for Standardization > By Technical Committee > JTC 1: Information technology > JTC 1/SC 27: IT Security techniques

Order Options

Delivery Options
Price: $84.00
Available for Immediate Download

Product Details

Published:

06/01/2002

Number of Pages:

14

File Size:

1 file

Note:

This product is restricted and cannot be purchased in the following countries Russia, Ukraine, Belarus
✕

Document Delivery Options

PDF
A Portable Document Format which is electronic and downloadable. All PDF's can be downloaded from your My Downloads page in your Accuris Store account. Refer to Help Center for more details.
Printed Edition
A vast majority of our standards are available in printed format. Sometimes these are bound like a book, sometimes loose pages that you can put in a binder.
✕

What is a Secured PDF?

Secured PDFs are equipped with Digital Rights Management (DRM) software, by request of the Publisher to protect the copyright of the Publication, preventing unauthorized duplication and distribution.

What does this mean?

To view the PDF, a DRM tool, FileOpen must be installed. FileOpen is a free plugin which is compatible with Adobe Acrobat Reader DC and Pro DC, as well as other PDF Readers noted on the FileOpen website.

What can you do with a Secured PDF?

  • Print (except for IADC, ICML)
  • Search
  • Highlight
  • Bookmark

Restrictions:

  • Some Publishers do not allow printing.
  • Most Publishers do not permit copy and pasting from the PDF.
  • Sharing, Duplicating and Distribution prohibited.
  • For further information on restrictions, please click here.

PRODUCTS & SERVICES

  1. BPVC 2025
  2. BPVC Previous Editions
  3. Engineering Workbench
  4. Track It

CUSTOMER CARE

  1. Help Center
  2. Glossary
  3. Search Tips

CONNECT WITH US

  1. Contact Us

COMPANY INFORMATION

  1. About Accuris
  2. Press
  • © Copyright 2026 ACCURIS
  • Privacy Policy
  • System Information
Device/OS: Unknown
Browser: Unknown Browser 0.0
User Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Store Name: css
Page: /standards/iso-iec-9797-2-2002?product_id=1035924
Referrer: Direct Navigation
IP: 216.73.216.32
Language: en
Customer #: Not Logged In
Member?: NO
Cart #: 1463758172
Order #: None
Cookies: NO
×