<p>This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an <em>m</em>-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.</p>
<p>NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.</p>
Registration number (WIID)
75296
Scope
<p>This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an <em>m</em>-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.</p>
<p>NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181‑6.</p>