message authentication code (MAC) - Glossary (2024)

    Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

message authentication code (MAC)

Definitions:

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Sources:
CNSSI 4009-2015

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-152 under Message Authentication Code (MAC)

A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Sources:
NIST SP 800-38B under Message Authentication Code (MAC)

A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Sources:
NIST SP 800-38C under Message Authentication Code (MAC)

A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-133 Rev. 2 under Message Authenciation Code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Sources:
NIST SP 800-63-3 under Message Authentication Code (MAC)

A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Message authentication code

A family of secret-key cryptographic algorithms acting on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). The MAC can be employed to provide an authentication of the origin of data and/or data-integrity protection. In this Recommendation, approved MAC algorithms are used to determine families of pseudorandom functions (indexed by the choice of key) that are employed during key derivation.
Sources:
NIST SP 800-108r1 [August 2022 (Includes updates as of 02-02-2024)] under message authentication code

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Sources:
NISTIR 7711 under Message Authentication Code

Glossary Comments

Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.

Comments about the glossary's presentation and functionality should be sent to [email protected].

See NISTIR 7298 Rev. 3 for additional details.

message authentication code (MAC) - Glossary (2024)

FAQs

What is the message authentication code used for on a MAC? ›

Message Authentication Code (MAC), also referred to as a tag, is used to authenticate the origin and nature of a message. MACs use authentication cryptography to verify the legitimacy of data sent through a network or transferred from one person to another.

What is a message authentication code for dummies? ›

A message authentication code uses a single key with the message and hashes it to validate the message's sender identity and ensure data integrity.

Does MAC provide authentication or confidentiality justify your answer? ›

MAC algorithm is a symmetric key cryptographic technique to provide message authentication. For establishing MAC process, the sender and receiver share a symmetric key K. Essentially, a MAC is an encrypted checksum generated on the underlying message that is sent along with a message to ensure message authentication.

How do I find my authentication code on MAC? ›

Go to Apple menu  > System Settings, then click your name. Click Sign-In & Security > Two-Factor Authentication. Click Get a Verification Code.

Where can I find a 6 digit authentication code? ›

Google Authenticator app generates a six-digit code for you to enter when you log in. The code changes about every minute. Once you have set up the connection with ACF's site, every time that you log out of your ACF account you will need to use Google Authenticator to regain access when you login again.

How to calculate message authentication code? ›

This can be seen as the one-time pad for authentication. The simplest such pairwise independent hash function is defined by the random key, key = (a, b), and the MAC tag for a message m is computed as tag = (am + b) mod p, where p is prime.

How does MAC authentication work? ›

MAC authentication uses a RADIUS server to temporarily assign a port to a static VLAN to support an authenticated client. During client authentication, the switch port membership is determined according to the following hierarchy: A RADIUS-assigned VLAN.

What is the difference between signature and message authentication code? ›

MAC and digital signatures are cryptographic techniques used to ensure the integrity and authenticity of messages. MACs use symmetric keys and provide integrity, while digital signatures use asymmetric keys and provide both integrity and non-repudiation.

What is my Apple authentication code? ›

The verification code is sent to the phone number associated with your Apple ID, or displayed on your trusted devices. Two-factor authentication for Apple ID is available in iOS 17, iPadOS 17, OS X 13, or later. Note: Certain account types might not support two-factor authentication.

Why does my Mac keep asking me to authenticate? ›

Your keychain may be locked automatically if your computer has been inactive for a period of time or your user password and keychain password are out of sync.

What is verification code on Mac? ›

A verification code is a temporary code sent to your trusted devices or phone number when you sign in to a new device or browser with your Apple ID. Important: When you receive a verification code, don't share it with other people.

What is the purpose of the MAC authentication profile? ›

MAC-based authentication is often used to authenticate and allow network access through certain devices while denying access to the rest.

Why does a message authentication code MAC need a shared secret key to be secure? ›

MACs differ from digital signatures as MAC values are both generated and verified using the same secret key. This implies that the sender and receiver of a message must agree on the same key before initiating communications, as is the case with symmetric encryption.

What is the message authentication function? ›

Message authentication is another form of security. Similar to data encryption to ensure data confidentiality, the message authentication data security feature: Provides services to ensure the integrity of data for selected LU-LU sessions.

What is verification code on MAC? ›

A verification code is a temporary code sent to your trusted devices or phone number when you sign in to a new device or browser with your Apple ID. Important: When you receive a verification code, don't share it with other people.

Top Articles
Buy Gold & Silver Bullion Online | Free Shipping - JM Bullion
Question | DigitalOcean
Cooking Chutney | Ask Nigella.com
30 Insanely Useful Websites You Probably Don't Know About
Senior Tax Analyst Vs Master Tax Advisor
Driving Directions To Fedex
What to Serve with Lasagna (80+ side dishes and wine pairings)
Es.cvs.com/Otchs/Devoted
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
Nikki Catsouras Head Cut In Half
OnTrigger Enter, Exit ...
Pollen Count Central Islip
All Obituaries | Ashley's J H Williams & Sons, Inc. | Selma AL funeral home and cremation
Craigslist Free Grand Rapids
Brutál jó vegán torta! – Kókusz-málna-csoki trió
Craigslist Free Stuff Santa Cruz
Tvtv.us Duluth Mn
Convert 2024.33 Usd
Voy Boards Miss America
Milspec Mojo Bio
Kountry Pumpkin 29
Selfservice Bright Lending
Pecos Valley Sunland Park Menu
Ice Dodo Unblocked 76
Gas Buddy Prices Near Me Zip Code
Bellin Patient Portal
Deshuesadero El Pulpo
O'reilly's In Mathis Texas
Ocala Craigslist Com
Pokemon Inflamed Red Cheats
Sony Wf-1000Xm4 Controls
Plasma Donation Racine Wi
Kacey King Ranch
Frequently Asked Questions - Hy-Vee PERKS
Word Trip Level 359
Autotrader Bmw X5
Nsu Occupational Therapy Prerequisites
4083519708
Powerspec G512
D3 Boards
Myfxbook Historical Data
Rs3 Bis Perks
Emily Tosta Butt
Devon Lannigan Obituary
Courtney Roberson Rob Dyrdek
300+ Unique Hair Salon Names 2024
Steam Input Per Game Setting
300 Fort Monroe Industrial Parkway Monroeville Oh
211475039
Gainswave Review Forum
Kindlerso
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5659

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.