Home | Library | Services | Events | Advisories | Contact |
Message AuthenticationCurrently, there exists two (2) FIPS-approved* algorithm for generating and verifying message/data authentication codes: DAC (better known as "MAC") and HMAC.
|
||||||||||
* NIST cryptographic standards are specified in Federal Information Processing Standards (FIPS) Publications. The term "FIPS-approved" indicates something (e.g., a cryptographic algorithm) that is either a) specified in a FIPS or b) adopted in a FIPS and specified either in an appendix to the FIPS or in a document referenced by the FIPS. |
||||||||||