A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
See checksum.
Source(s):
CNSSI 4009-2015
FIPS 201-1
Message Authentication Code.
Source(s):
NIST SP 800-108
under MAC
NIST SP 800-185
under MAC
NIST SP 800-56C
under MAC
[Superseded]
A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity.
Source(s):
NIST SP 800-108
under Message authentication code
a data authenticator generated from the message, usually through cryptographic techniques. In general, a cryptographic key is also required as an input.
Source(s):
NIST SP 800-15
under message authentication code
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-152
under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 3
under Message authentication code (MAC)
[Superseded]
A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Source(s):
NIST SP 800-38B
under Message Authentication Code (MAC)
A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Source(s):
NIST SP 800-38C
under Message Authentication Code (MAC)
A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
under Message authentication code (MAC)
[Superseded]
NIST SP 800-57 Part 1 Rev. 5
under Message authentication code (MAC)
NIST SP 800-175B Rev. 1
under Message Authentication Code (MAC)
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Source(s):
NIST SP 800-63-3
under Message Authentication Code (MAC)
NIST SP 800-63-2
under Message Authentication Code (MAC)
[Superseded]
A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Message authentication code
A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data (called a message) of an arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity protection. In this Recommendation, a MAC algorithm is also called a MAC function.
Source(s):
NIST SP 800-56C
under Message authentication code (MAC)
[Superseded]
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Source(s):
NISTIR 7711
under Message Authentication Code
FIPS 201
under Message Authentication Code (MAC)
[version unknown]