Message Integrity Codes
The term message integrity code (MIC) is frequently substituted for the term MAC, especially in communications, where the acronym MAC traditionally stands for Media Access Control. However, some authors use MIC as a distinctly different term from a MAC; in their usage of the term the MIC operation does not use secret keys. This lack of security means that any MIC intended for use gauging message integrity should be encrypted or otherwise be protected against tampering. MIC algorithms are created such that a given message will always produce the same MIC assuming the same algorithm is used to generate both. Conversely, MAC algorithms are designed to produce matching MACs only if the same message, secret key and initialization vector are input to the same algorithm. MICs do not use secret keys and, when taken on their own, are therefore a much less reliable gauge of message integrity than MACs. Because MACs use secret keys, they do not necessarily need to be encrypted to provide the same level of assurance.
Read more about this topic: Message Authentication Code
Famous quotes containing the words message, integrity and/or codes:
“The thief. Once committed beyond a certain point he should not worry himself too much about not being a thief any more. Thieving is Gods message to him. Let him try and be a good thief.”
—Samuel Butler (18351902)
“Im no idealist to believe firmly in the integrity of our courts and in the jury systemthat is no ideal to me, it is a living, working reality. Gentlemen, a court is no better than each man of you sitting before me on this jury. A court is only as sound as its jury, and a jury is only as sound as the men who make it up.”
—Harper Lee (b. 1926)
“Thou hast a voice, great Mountain, to repeal
Large codes of fraud and woe; not understood
By all, but which the wise, and great, and good
Interpret, or make felt, or deeply feel.”
—Percy Bysshe Shelley (17921822)