Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Message Authentication Code (MAC)

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
A small piece of information used to authenticate a message and provide integrity and authenticity of that message.
Published in Chapter:
Security in Ad Hoc Network and Computing Paradigms
Poonam Saini (PEC University of Technology, India) and Awadhesh Kumar Singh (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-5225-0105-3.ch005
Abstract
Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Consistency Is Not Enough in Byzantine Fault Tolerance
A MAC is produced by a keyed secure hash function on a message. It is used to ensure the integrity of the message such that if a message protected by a MAC is tampered, it can be detected by comparing the MAC included with in the message and the recomputed MAC.
Full Text Chapter Download: US $37.50 Add to Cart
Consistency Is Not Enough in Byzantine Fault Tolerance
A MAC is produced by a keyed secure hash function on a message. It is used to ensure the integrity of the message such that if a message protected by a MAC is tampered, it can be detected by comparing the MAC included with in the message and the recomputed MAC.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Service Integrity of Byzantine Fault Tolerant Applications
A MAC is produced by a keyed secure hash function on a message. It is used to ensure the integrity of the message such that if a message protected by a MAC is tampered, it can be detected by comparing the MAC included with in the message and the recomputed MAC.
Full Text Chapter Download: US $37.50 Add to Cart
Smarter Data Availability Checks in the Cloud: Proof of Storage via Blockchain
MAC is the metadata (or tag) of a message that allows a verifier to authenticate the message or detect the message modification. The algorithm that generates a MAC is usually a symmetric-key cryptographic scheme that is highly efficient. It is often used in cases where the party who generates and verifies a MAC is the same (i.e., supports only private verification).
Full Text Chapter Download: US $37.50 Add to Cart
Resilience Against False Data Injection Attack in Wireless Sensor Networks
It is a short piece of information used to authenticate a message.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR