Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

message authentication code (MAC)

Definitions:

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. See checksum.
Sources:
CNSSI 4009-2015

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-152 under Message Authentication Code (MAC)

  A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.
Sources:
NIST SP 800-38B under Message Authentication Code (MAC)

  A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.
Sources:
NIST SP 800-38C under Message Authentication Code (MAC)

  A cryptographic checksum on data that uses an approved security function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-133 Rev. 2 under Message Authenciation Code (MAC)
NIST SP 800-175B Rev. 1 under Message Authentication Code (MAC)
NIST SP 800-57 Part 1 Rev. 5 under Message authentication code (MAC)

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.
Sources:
NIST SP 800-63-3 under Message Authentication Code (MAC)

  A cryptographic checksum based on an approved cryptographic function and a symmetric key to detect both accidental and intentional modifications of data.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Message authentication code

  A family of secret-key cryptographic algorithms acting on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). The MAC can be employed to provide an authentication of the origin of data and/or data-integrity protection. In this Recommendation, approved MAC algorithms are used to determine families of pseudorandom functions (indexed by the choice of key) that are employed during key derivation.
Sources:
NIST SP 800-108r1 [August 2022 (Includes updates as of 02-02-2024)] under message authentication code

  A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Sources:
NISTIR 7711 under Message Authentication Code