Message Integrity Codes
The term message integrity code (MIC) is frequently substituted for the term MAC, especially in communications, where the acronym MAC traditionally stands for Media Access Control. However, some authors use MIC as a distinctly different term from a MAC; in their usage of the term the MIC operation does not use secret keys. This lack of security means that any MIC intended for use gauging message integrity should be encrypted or otherwise be protected against tampering. MIC algorithms are created such that a given message will always produce the same MIC assuming the same algorithm is used to generate both. Conversely, MAC algorithms are designed to produce matching MACs only if the same message, secret key and initialization vector are input to the same algorithm. MICs do not use secret keys and, when taken on their own, are therefore a much less reliable gauge of message integrity than MACs. Because MACs use secret keys, they do not necessarily need to be encrypted to provide the same level of assurance.
Read more about this topic: Message Authentication Code
Famous quotes containing the words message, integrity and/or codes:
“The thief. Once committed beyond a certain point he should not worry himself too much about not being a thief any more. Thieving is Gods message to him. Let him try and be a good thief.”
—Samuel Butler (18351902)
“A task becomes a duty from the moment you suspect it to be an essential part of that integrity which alone entitles a man to assume responsibility.”
—Dag Hammarskjöld (19051961)
“I cannot help thinking that the menace of Hell makes as many devils as the severe penal codes of inhuman humanity make villains.”
—George Gordon Noel Byron (17881824)