![]() 2 A MAC algorithm is a family of cryptographic functions – parameterized by a symmetric key – that can be used to provide data origin authentication, as well as data integrity, by producing a MAC tag on arbitrary data (the message). In this Recommendaton, a MAC algorithm is used for key confirmation the use of MAC algorithms for key derivation is addressed in SP 800-56C. A MAC algorithm can be used to provide data-origon authenication and data-integrity protection. ![]() An approved MAC algorithm is expected to satisfy the following property (for each of its supported security levels): It must be computationally infeasible to determine the (as yet unseen) MAC of a message without knowledge of the key, even if one has already seen the results of using that key to compute the MAC's of other (different) messages. The output value is called the MAC of the input message. Each of the functions can act on input data (called a “message”) of variable length to produce an output value of a specified length. A family of cryptographic functions that is parameterized by a symmetric key.
0 Comments
Leave a Reply. |