U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

message authentication code (MAC)

Abbreviation(s) and Synonym(s):

MAC

Definition(s):

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Source(s):
CNSSI 4009-2015 FIPS 201-1

  Message Authentication Code.
Source(s):
NIST SP 800-108 under MAC
NIST SP 800-185 under MAC
NIST SP 800-56C under MAC [Superseded]

  A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity.
Source(s):
NIST SP 800-108 under Message authentication code

  a data authenticator generated from the message, usually through cryptographic techniques. In general, a cryptographic key is also required as an input.
Source(s):
NIST SP 800-15 under message authentication code

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-152 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 3 under Message authentication code (MAC) [Superseded]

  A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Source(s):
NIST SP 800-38B under Message Authentication Code (MAC)

  A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Source(s):
NIST SP 800-38C under Message Authentication Code (MAC)

  A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Message authentication code (MAC) [Superseded]
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Source(s):
NIST SP 800-63-3 under Message Authentication Code (MAC)
NIST SP 800-63-2 under Message Authentication Code (MAC) [Superseded]

  A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Message authentication code

  A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data (called a message) of an arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity protection. In this Recommendation, a MAC algorithm is also called a MAC function.
Source(s):
NIST SP 800-56C under Message authentication code (MAC) [Superseded]

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Source(s):
NISTIR 7711 under Message Authentication Code
FIPS 201 under Message Authentication Code (MAC) [version unknown]