message authentication code (MAC) - Glossary (2024)

    Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

message authentication code (MAC)

Definitions:

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Sources:
CNSSI 4009-2015

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-152 under Message Authentication Code (MAC)

A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Sources:
NIST SP 800-38B under Message Authentication Code (MAC)

A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Sources:
NIST SP 800-38C under Message Authentication Code (MAC)

A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-133 Rev. 2 under Message Authenciation Code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Sources:
NIST SP 800-63-3 under Message Authentication Code (MAC)

A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Message authentication code

A family of secret-key cryptographic algorithms acting on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). The MAC can be employed to provide an authentication of the origin of data and/or data-integrity protection. In this Recommendation, approved MAC algorithms are used to determine families of pseudorandom functions (indexed by the choice of key) that are employed during key derivation.
Sources:
NIST SP 800-108r1 [August 2022 (Includes updates as of 02-02-2024)] under message authentication code

A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Sources:
NISTIR 7711 under Message Authentication Code

Glossary Comments

Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.

Comments about the glossary's presentation and functionality should be sent to [email protected].

See NISTIR 7298 Rev. 3 for additional details.

message authentication code (MAC) - Glossary (2024)

FAQs

What is the message authentication code used for on a MAC? ›

Message Authentication Code (MAC), also referred to as a tag, is used to authenticate the origin and nature of a message. MACs use authentication cryptography to verify the legitimacy of data sent through a network or transferred from one person to another.

What is a message authentication code for dummies? ›

A message authentication code uses a single key with the message and hashes it to validate the message's sender identity and ensure data integrity.

Does MAC provide authentication or confidentiality justify your answer? ›

MAC algorithm is a symmetric key cryptographic technique to provide message authentication. For establishing MAC process, the sender and receiver share a symmetric key K. Essentially, a MAC is an encrypted checksum generated on the underlying message that is sent along with a message to ensure message authentication.

How do I find my authentication code on MAC? ›

Go to Apple menu  > System Settings, then click your name. Click Sign-In & Security > Two-Factor Authentication. Click Get a Verification Code.

Where can I find a 6 digit authentication code? ›

Google Authenticator app generates a six-digit code for you to enter when you log in. The code changes about every minute. Once you have set up the connection with ACF's site, every time that you log out of your ACF account you will need to use Google Authenticator to regain access when you login again.

How to calculate message authentication code? ›

This can be seen as the one-time pad for authentication. The simplest such pairwise independent hash function is defined by the random key, key = (a, b), and the MAC tag for a message m is computed as tag = (am + b) mod p, where p is prime.

How does MAC authentication work? ›

MAC authentication uses a RADIUS server to temporarily assign a port to a static VLAN to support an authenticated client. During client authentication, the switch port membership is determined according to the following hierarchy: A RADIUS-assigned VLAN.

What is the difference between signature and message authentication code? ›

MAC and digital signatures are cryptographic techniques used to ensure the integrity and authenticity of messages. MACs use symmetric keys and provide integrity, while digital signatures use asymmetric keys and provide both integrity and non-repudiation.

What is my Apple authentication code? ›

The verification code is sent to the phone number associated with your Apple ID, or displayed on your trusted devices. Two-factor authentication for Apple ID is available in iOS 17, iPadOS 17, OS X 13, or later. Note: Certain account types might not support two-factor authentication.

Why does my Mac keep asking me to authenticate? ›

Your keychain may be locked automatically if your computer has been inactive for a period of time or your user password and keychain password are out of sync.

What is verification code on Mac? ›

A verification code is a temporary code sent to your trusted devices or phone number when you sign in to a new device or browser with your Apple ID. Important: When you receive a verification code, don't share it with other people.

What is the purpose of the MAC authentication profile? ›

MAC-based authentication is often used to authenticate and allow network access through certain devices while denying access to the rest.

Why does a message authentication code MAC need a shared secret key to be secure? ›

MACs differ from digital signatures as MAC values are both generated and verified using the same secret key. This implies that the sender and receiver of a message must agree on the same key before initiating communications, as is the case with symmetric encryption.

What is the message authentication function? ›

Message authentication is another form of security. Similar to data encryption to ensure data confidentiality, the message authentication data security feature: Provides services to ensure the integrity of data for selected LU-LU sessions.

What is verification code on MAC? ›

A verification code is a temporary code sent to your trusted devices or phone number when you sign in to a new device or browser with your Apple ID. Important: When you receive a verification code, don't share it with other people.

Top Articles
Cryptocurrency in India: Regulations, Trends, and Adoption
How to split bills with roommates | Split bills based on income
Average Jonas Wife
Pieology Nutrition Calculator Mobile
9192464227
Wausau Marketplace
Www Movieswood Com
Umn Biology
Student Rating Of Teaching Umn
Craigslist Labor Gigs Albuquerque
Lesson 2 Homework 4.1
10 Great Things You Might Know Troy McClure From | Topless Robot
Ukraine-Russia war: Latest updates
Eka Vore Portal
Bnsf.com/Workforce Hub
Paychex Pricing And Fees (2024 Guide)
Itziar Atienza Bikini
Missed Connections Dayton Ohio
Aldine Isd Pay Scale 23-24
U Break It Near Me
Azpeople View Paycheck/W2
Kringloopwinkel Second Sale Roosendaal - Leemstraat 4e
Bidevv Evansville In Online Liquid
Best Boston Pizza Places
Drying Cloths At A Hammam Crossword Clue
Telegram Voyeur
Bj타리
Claio Rotisserie Menu
Gncc Live Timing And Scoring
+18886727547
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
What Are Digital Kitchens & How Can They Work for Foodservice
Hannibal Mo Craigslist Pets
State Legislatures Icivics Answer Key
Zasilacz Dell G3 15 3579
Wunderground Orlando
Lonely Wife Dating Club בקורות וחוות דעת משתמשים 2021
Other Places to Get Your Steps - Walk Cabarrus
Discover Things To Do In Lubbock
Comanche Or Crow Crossword Clue
Unlock The Secrets Of "Skip The Game" Greensboro North Carolina
Ups Authorized Shipping Provider Price Photos
Honkai Star Rail Aha Stuffed Toy
St Anthony Hospital Crown Point Visiting Hours
Greatpeople.me Login Schedule
Acuity Eye Group - La Quinta Photos
Craigslist Indpls Free
March 2023 Wincalendar
Southwind Village, Southend Village, Southwood Village, Supervision Of Alcohol Sales In Church And Village Halls
O'reilly's Eastman Georgia
Kindlerso
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5659

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.