Message authentication is a mechanism or service used to verify the integrity of a message.

92)Message authentication is a mechanism or service used to verify the integrity of a message.92)______93)The first part of the Schnorr digital signature scheme is the generation of a private/public key pair.93)______94)Unlike RSA, DSS cannot be used for encryption or key exchange.94)______95)Symmetric encryption remains by far the most widely used of the two types of encryption.95)______96)The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring lowsecurity.96)______

97)One criteria for an S-box is:"If two inputs to an S-box differ in exactly one bit, the outputs must also differin exactly one bit.97)______98)The Rijndael developers designed the expansion key algorithm to be resistant to known cryptanalyticattacks.98)______99)Cipher Feedback (CFB) is used for the secure transmission of single values.99)______100)Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.100)____101)The way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to theeffort required for a brute-force attack.101)____102)The security of any MAC function based on an embedded hash function depends in some way on thecryptographic strength of the underlying hash function.102)____103)The global public key components of DSA are the same as for the Schnorr signature scheme.103)____104)On average, half of all possible keys must be tried to achieve success with a brute-force attack.104)____105)The Feistel cipher structure, based on Shannon's proposal of 1945, dates back over a quarter of a centuryand is the structure used by many significant symmetric block ciphers currently in use.

105)_____106)The nonlinearity of the S-box is due to the use of the multiplicative inverse.106)_____107)S-AES is the most widely used multiple encryption scheme.107)_____108)Public-key encryption is more secure from cryptanalysis than symmetric encryption.108)_____Answer keys1)A2)

Get answer to your question and much more

B51)Data Encryption Standard (DES)52)Vigenère53)Data Encryption Standard (DES)54)

Blowfish55)MixColumns56)Rijndael57)output feedback mode (OFB)58)

RSA59)MD560)Wired Equivalent Privacy (WEP)61)direct digital signature62)

brute-force63)Feistel64)Advanced Encryption Standard (AES)65)Cipher Block Chaining (CBC)66)

ciphertext67)compression68)message encryption69)be verifiable by third parties70)

Upload your study docs or become a

Course Hero member to access this document

A message authentication code (MAC) is a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data.

A MAC requires two inputs: a message and a secret key known only to the originator of the message and its intended recipient(s). This allows the recipient of the message to verify the integrity of the message and authenticate that the messege's sender has the shared secret key. If a sender doesn’t know the secret key, the hash value would then be different, which would tell the recipient that the message was not from the original sender. 

There are four types of MACs:  unconditionally secure, hash function-based, stream cipher-based  and block cipher-based  In the past, the most common approach to creating a MAC was to use block ciphers like Data Encryption Standard (DES), but hash-based MACs (HMACs) which use a secret key in conjunction with a cryptographic hash function to produce a hash, have become more widely used.

This was last updated in November 2010

Next Steps

Authentication comes in all sizes and flavors, and security pros need to know the differences between subjects like data integrity and PKI, and Multifactor authentication. Learn about the various types of data integrity authentication schemes such as message authentication protocol (MAC) and hashing algorithms to ensure data hasn’t been tampered with along the way. Then, read about how to build a business case for MFA.

Continue Reading About message authentication code (MAC)

  • Learn how wireless security protocols work
  • This Q/A covers why MAC and HMAC use hash function encryption for authentication
  • Read about how to prevent spoofing, and the importance of MAC addresses
  • Learn about security requirements for message authentication in this presentation

Dig Deeper on Identity and access management

  • Message authentication is a mechanism or service used to verify the integrity of a message.
    initialization vector

    Message authentication is a mechanism or service used to verify the integrity of a message.

    By: Rahul Awati

  • Message authentication is a mechanism or service used to verify the integrity of a message.
    Symmetric vs. asymmetric encryption: What's the difference?

    By: Michael Cobb

  • Message authentication is a mechanism or service used to verify the integrity of a message.
    encryption

    Message authentication is a mechanism or service used to verify the integrity of a message.

    By: Peter Loshin

  • Message authentication is a mechanism or service used to verify the integrity of a message.
    Wireless Transport Layer Security (WTLS)

    Message authentication is a mechanism or service used to verify the integrity of a message.

    By: Rahul Awati

Which mechanism or service is used to verify the integrity of a message?

Message Authentication: Message authentication is a mechanism or service used to verify the integrity of a message. to as a message digest.

Does Message Authentication Code provide integrity?

Message authentication codes (MACs) are commonly used in electronic funds transfers (EFTs) to maintain information integrity. They confirm that a message is authentic; that it really does come, in other words, from the stated sender, and hasn't undergone any changes en route.

What does message authentication do?

A message authentication code (MAC) is a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data. A MAC requires two inputs: a message and a secret key known only to the originator of the message and its intended recipient(s).

What is message authentication and what does message authentication protect against?

Protection against such attacks is known as message authentication. A message, file, document, or other collection of data is said to be authentic when it is genuine and came from its alleged source. Message authentication is a procedure that allows communicating parties to verify that received message is authentic.