This Standard specifies two Message Authentication Code (MAC) algorithms that use a secret key and a hash-function with an n-bit result to calculate an m-bit MAC. These mechanisms are data integrity mechanisms to verify that data has not been altered in an unauthorized manner. They may also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of the hash-function and its strength, on the length (in bits) m of the MAC, and on the specific mechanism.This Standard provides a method for protection against accidental or deliberate alteration of messages between sending and receiving parties. A hash-function based file integrity mechanism is described in AS 2805.10.1.This Standard does not provide for - (a) the use of encryption for the protection of messages against unauthorized disclosure; or(b) protection against message loss or duplication .