Message Authentication Code definition
Examples of Message Authentication Code in a sentence
The second Message Authentication Code (MAC2) is used for interoperability purposes, to allow another TC/TSP than the one who issued the OBE to perform an early detection of a foreign vehicle equipped with an unauthorised/illegal/illicit OBE.
The first Message Authentication Code (MAC1) is used by a TC to check the authenticity of an OBE that the same TC/TSP has issued (it is usually a combined TC/TSP role in Norway).
Encrypt-then- MAC The plaintext is first encrypted, and then a Message Authentication Code (MAC) is produced based on the resulting ciphertext.
Direct identifiers will be hashed prior to being transmitted to the ADRF using the Hash-based Message Authentication Code (HMAC) algorithm.
Further, if the Di uses a hash to create a validation value that does not reveal the shared secret in any way or the Di uses a nonce and Message Authentication Code (MAC) in a challenge/response protocol (see [6]) then an invalid key attack would not directly reveal any information to a rogue HD.
Additionally, we assume that two ad-hoc groups use the same hash function, such as SHA 1 or MD 5, used to compute session keys and MAC (Message Authentication Code) for secure routing.
The CredentialMac element is used for the Message Authentication Code (MAC) authentication method.
Message Authentication Code (MAC) A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
Subsequently the following values are computed: a Message Authentication Code M AC=f1K(SQN||RAND||AMF) where f1 is a message authentication function; an eXpected RESponse XRES=f2K(RAND) where f2 is a message authentication function; a Cipher Key CK=f3K(RAND)where f3 is a key generating function; an Integrity Key IK=f4K(RAND)where f4 is a key generating function; an Anonymity Key AK=f5K(RAND)where f5 is a key generating function.
Data Authentication or Data Integrity - Equipment or software which calculates a Message Authentication Code (MAC) or similar result to assure the identity of the source of the data.