Message Authentication Code definition

Message Authentication Code has the meaning given to that expression in the GB Companion Specification (or, where used in the context of a communication not specified by the GB Companion Specification, the meaning associated with the relevant cryptographic algorithm used to generate it).

Examples of Message Authentication Code in a sentence

  • The second Message Authentication Code (MAC2) is used for interoperability purposes, to allow another TC/TSP than the one who issued the OBE to perform an early detection of a foreign vehicle equipped with an unauthorised/illegal/illicit OBE.

  • The first Message Authentication Code (MAC1) is used by a TC to check the authenticity of an OBE that the same TC/TSP has issued (it is usually a combined TC/TSP role in Norway).

  • Encrypt-then- MAC The plaintext is first encrypted, and then a Message Authentication Code (MAC) is produced based on the resulting ciphertext.

  • Direct identifiers will be hashed prior to being transmitted to the ADRF using the Hash-based Message Authentication Code (HMAC) algorithm.

  • Further, if the Di uses a hash to create a validation value that does not reveal the shared secret in any way or the Di uses a nonce and Message Authentication Code (MAC) in a challenge/response protocol (see [6]) then an invalid key attack would not directly reveal any information to a rogue HD.

  • Additionally, we assume that two ad-hoc groups use the same hash function, such as SHA 1 or MD 5, used to compute session keys and MAC (Message Authentication Code) for secure routing.

  • The CredentialMac element is used for the Message Authentication Code (MAC) authentication method.

  • Message Authentication Code (MAC) A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.

  • Subsequently the following values are computed:  a Message Authentication Code M AC=f1K(SQN||RAND||AMF) where f1 is a message authentication function;  an eXpected RESponse XRES=f2K(RAND) where f2 is a message authentication function;  a Cipher Key CK=f3K(RAND)where f3 is a key generating function;  an Integrity Key IK=f4K(RAND)where f4 is a key generating function;  an Anonymity Key AK=f5K(RAND)where f5 is a key generating function.

  • Data Authentication or Data Integrity - Equipment or software which calculates a Message Authentication Code (MAC) or similar result to assure the identity of the source of the data.

Related to Message Authentication Code

  • Secure Authentication means access to the Licensed Work by Internet Protocol (“IP”) ranges, Referring URL, Username and Password, or by another means of authentication agreed in writing between the Publisher and the Licensee from time to time.

  • Certificate of Authentication The meaning specified in Section 2.1.

  • Multi-factor Authentication means controlling access to computers and other IT resources by requiring two or more pieces of evidence that the user is who they claim to be. These pieces of evidence consist of something the user knows, such as a password or PIN; something the user has such as a key card, smart card, or physical token; and something the user is, a biometric identifier such as a fingerprint, facial scan, or retinal scan. “PIN” means a personal identification number, a series of numbers which act as a password for a device. Since PINs are typically only four to six characters, PINs are usually used in conjunction with another factor of authentication, such as a fingerprint.

  • Strong Customer Authentication means an authentication based on the use of two or more elements categorised as knowledge (something only the user knows), possession (something only the user possesses) and inherence (something the user is) that are independent, in that the breach of one does not compromise the reliability of the others, and is designed in such a way as to protect the confidentiality of the authentication data;

  • Authentication Agent means an institution, reasonably acceptable to the Company, appointed by the Trustee to authenticate the Notes.