A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
See checksum.
Sources:
CNSSI 4009-2015
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-152
under Message Authentication Code (MAC)
A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Sources:
NIST SP 800-38B
under Message Authentication Code (MAC)
A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Sources:
NIST SP 800-38C
under Message Authentication Code (MAC)
A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-133 Rev. 2
under Message Authenciation Code (MAC)
NIST SP 800-175B Rev. 1
under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 5
under Message authentication code (MAC)
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Sources:
NIST SP 800-63-3
under Message Authentication Code (MAC)
A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-57 Part 2 Rev.1
under Message authentication code
A family of secret-key cryptographic algorithms acting on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). The MAC can be employed to provide an authentication of the origin of data and/or data-integrity protection. In this Recommendation, approved MAC algorithms are used to determine families of pseudorandom functions (indexed by the choice of key) that are employed during key derivation.
Sources:
NIST SP 800-108r1
[August 2022 (Includes updates as of 02-02-2024)]
under message authentication code
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Sources:
NISTIR 7711
under Message Authentication Code