U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

message authentication code (MAC)

Definition(s):

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Source(s):
CNSSI 4009-2015 from FIPS 201-1

  Message Authentication Code.
Source(s):
NIST SP 800-108 under MAC
NIST SP 800-185 under MAC
NIST SP 800-56C [Superseded] under MAC

  A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity.
Source(s):
NIST SP 800-108 under Message authentication code

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-152 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Message authentication code (MAC)

  A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Source(s):
NIST SP 800-38B under Message Authentication Code (MAC)

  A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Source(s):
NIST SP 800-38C under Message Authentication Code (MAC)

  A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)
NIST SP 800-133 Rev. 2 under Message Authenciation Code (MAC)
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Message authentication code (MAC)

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Source(s):
NIST SP 800-63-3 under Message Authentication Code (MAC)
NIST SP 800-63-2 [Superseded] under Message Authentication Code (MAC)

  A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Message authentication code

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Source(s):
NISTIR 7711 under Message Authentication Code
FIPS 201 [version unknown] under Message Authentication Code (MAC)

  a data authenticator generated from the message, usually through cryptographic techniques. In general, a cryptographic key is also required as an input.
Source(s):
NIST SP 800-15 [Withdrawn] under message authentication code

  A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data (called a message) of an arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity protection. In this Recommendation, a MAC algorithm is also called a MAC function.
Source(s):
NIST SP 800-56C [Superseded] under Message authentication code (MAC)