GB/T 15852.2-2012 Information technology.Security techniques.Message Authentication Codes (MACs).Part 2:Mechanisms using a dedicated hash-function (English Version)
This part of GB/T 15852 specifies three message authentication code algorithms using special hash functions. These message authentication code algorithms can be used as data integrity checks to check whether data has been changed without authorization. These message authentication code algorithms also It can be used for message authentication to ensure the legitimacy of the message source, data integrity and the strength of message authentication depend on the length of the key and its confidentiality, the algorithm strength of the hash function and its output length, the length of the message authentication code and the specific Message authentication code algorithm, this section applies to any security architecture, process or application security services,
GB/T 15852.2-2012 Referenced Document
GB/T 1988-1998 Information technology--7-bit Coded character set for information interchange
ISO/IEC 10118-3:2004 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
GB/T 15852.2-2012 history
2012GB/T 15852.2-2012 Information technology.Security techniques.Message Authentication Codes (MACs).Part 2:Mechanisms using a dedicated hash-function