A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
message authentication code (MAC)
Share to Facebook Share to Twitter Share to LinkedIn Share ia Email
Abbreviations / Acronyms / Synonyms:
Definitions:
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Sources:
CNSSI 4009-2015
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-152 under Message Authentication Code (MAC)
A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Sources:
NIST SP 800-38B under Message Authentication Code (MAC)
A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Sources:
NIST SP 800-38C under Message Authentication Code (MAC)
A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-133 Rev. 2 under Message Authenciation Code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Sources:
NIST SP 800-63-3 under Message Authentication Code (MAC)
A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Message authentication code
A family of secret-key cryptographic algorithms acting on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). The MAC can be employed to provide an authentication of the origin of data and/or data-integrity protection. In this Recommendation, approved MAC algorithms are used to determine families of pseudorandom functions (indexed by the choice of key) that are employed during key derivation.
Sources:
NIST SP 800-108r1 [August 2022 (Includes updates as of 02-02-2024)] under message authentication code
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Sources:
NISTIR 7711 under Message Authentication Code
Glossary Comments
Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.
Comments about the glossary's presentation and functionality should be sent to [email protected].
See NISTIR 7298 Rev. 3 for additional details.