Message Authentication Code - Message Integrity Codes

Message Integrity Codes

The term message integrity code (MIC) is frequently substituted for the term MAC, especially in communications, where the acronym MAC traditionally stands for Media Access Control. However, some authors use MIC as a distinctly different term from a MAC; in their usage of the term the MIC operation does not use secret keys. This lack of security means that any MIC intended for use gauging message integrity should be encrypted or otherwise be protected against tampering. MIC algorithms are created such that a given message will always produce the same MIC assuming the same algorithm is used to generate both. Conversely, MAC algorithms are designed to produce matching MACs only if the same message, secret key and initialization vector are input to the same algorithm. MICs do not use secret keys and, when taken on their own, are therefore a much less reliable gauge of message integrity than MACs. Because MACs use secret keys, they do not necessarily need to be encrypted to provide the same level of assurance.

Read more about this topic:  Message Authentication Code

Famous quotes containing the words message, integrity and/or codes:

    The thief. Once committed beyond a certain point he should not worry himself too much about not being a thief any more. Thieving is God’s message to him. Let him try and be a good thief.
    Samuel Butler (1835–1902)

    I’m no idealist to believe firmly in the integrity of our courts and in the jury system—that is no ideal to me, it is a living, working reality. Gentlemen, a court is no better than each man of you sitting before me on this jury. A court is only as sound as its jury, and a jury is only as sound as the men who make it up.
    Harper Lee (b. 1926)

    Thou hast a voice, great Mountain, to repeal
    Large codes of fraud and woe; not understood
    By all, but which the wise, and great, and good
    Interpret, or make felt, or deeply feel.
    Percy Bysshe Shelley (1792–1822)