Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Message Authentication Codes

  • Marina BlantonEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_1483


MAC; Message integrity codes


A message authentication code (MAC) is a short fixed-length value which is used to authenticate a message. A MAC algorithm can roughly be viewed as a hash function that takes as input two functionally distinct values: a secret key and a message. The output of a MAC algorithm is a short string computed in such a way that it is infeasible to produce the correct output on a message without the knowledge of the key. Thus, the MAC value protects both the integrity and authenticity of a message by allowing the entity in possession of the secret key to detect any changes to the message content.

Key Points

While MAC functions have conceptual similarities to keyed cryptographic hash functions, they have specific security requirements for authentication purposes that make them a distinct security tool. More precisely, an attacker who does not have access to the secret key and has not seen the MAC value for a specific message before should not be...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Krawczyk H, Bellare M, Canetti R. HMAC: keyed-hashing for message authentication, RFC 2104. Internet Engineering Task Force (IETF), 1997.Google Scholar
  2. 2.
    Stallings W. Cryptography and network security: principles and practices. 4th ed. Upper Saddle River: Pearson-Prentice Hall; 2006.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.University of Notre DameNotre DameUSA

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly