Message Integrity Codes
The term message integrity code (MIC) is frequently substituted for the term MAC, especially in communications, where the acronym MAC traditionally stands for Media Access Control. However, some authors use MIC as a distinctly different term from a MAC; in their usage of the term the MIC operation does not use secret keys. This lack of security means that any MIC intended for use gauging message integrity should be encrypted or otherwise be protected against tampering. MIC algorithms are created such that a given message will always produce the same MIC assuming the same algorithm is used to generate both. Conversely, MAC algorithms are designed to produce matching MACs only if the same message, secret key and initialization vector are input to the same algorithm. MICs do not use secret keys and, when taken on their own, are therefore a much less reliable gauge of message integrity than MACs. Because MACs use secret keys, they do not necessarily need to be encrypted to provide the same level of assurance.
Read more about this topic: Message Authentication Code
Famous quotes containing the words message, integrity and/or codes:
“No it is better not. She would only ask me to take a message to Albert.”
—Benjamin Disraeli (18041881)
“Dreams have a poetic integrity and truth. This limbo and dust- hole of thought is presided over by a certain reason, too. Their extravagance from nature is yet within a higher nature.”
—Ralph Waldo Emerson (18031882)
“... until both employers and workers groups assume responsibility for chastising their own recalcitrant children, they can vainly bay the moon about ignorant and unfair public criticism. Moreover, their failure to impose voluntarily upon their own groups codes of decency and honor will result in more and more necessity for government control.”
—Mary Barnett Gilson (1877?)