GB/T 15852.2-2012
Information technology.Security techniques.Message Authentication Codes (MACs).Part 2:Mechanisms using a dedicated hash-function (English Version)

GB/T 15852.2-2012
Standard No.
GB/T 15852.2-2012
Language
Chinese, Available in English version
Release Date
2012
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Latest
GB/T 15852.2-2012
Scope
This part of GB/T 15852 specifies three message authentication code algorithms using special hash functions. These message authentication code algorithms can be used as data integrity checks to check whether data has been changed without authorization. These message authentication code algorithms also It can be used for message authentication to ensure the legitimacy of the message source, data integrity and the strength of message authentication depend on the length of the key and its confidentiality, the algorithm strength of the hash function and its output length, the length of the message authentication code and the specific Message authentication code algorithm, this section applies to any security architecture, process or application security services,

GB/T 15852.2-2012 Referenced Document

  • GB/T 1988-1998 Information technology--7-bit Coded character set for information interchange
  • ISO/IEC 10118-3:2004 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions

GB/T 15852.2-2012 history

  • 2012 GB/T 15852.2-2012 Information technology.Security techniques.Message Authentication Codes (MACs).Part 2:Mechanisms using a dedicated hash-function

GB/T 15852.2-2012 -All Parts




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved