cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking...
16 KB (1,918 words) - 17:55, 22 January 2025
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data...
6 KB (612 words) - 10:29, 1 June 2025
DMARC (redirect from Domain-based Message Authentication, Reporting & Conformance)
Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication protocol. It is designed to give email domain owners...
32 KB (3,717 words) - 14:28, 24 May 2025
HMAC (redirect from Keyed-Hashing Message Authentication)
either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving...
18 KB (2,316 words) - 18:51, 16 April 2025
CCMP (cryptography) (redirect from Counter Mode Cipher Block Chaining Message Authentication Code Protocol)
Cipher Block Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an authenticated encryption protocol...
5 KB (594 words) - 05:39, 11 December 2024
The Message Authenticator Algorithm (MAA) was one of the first cryptographic functions for computing a message authentication code (MAC). It was designed...
9 KB (954 words) - 09:25, 27 May 2025
Galois/Counter Mode (redirect from Galois Message Authentication Code)
field GF(2128) to compute the authentication tag; hence the name. Galois Message Authentication Code (GMAC) is an authentication-only variant of the GCM which...
23 KB (3,051 words) - 20:21, 24 March 2025
Cryptographic hash function (redirect from Cryptographic message digest)
applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash...
49 KB (6,299 words) - 15:10, 30 May 2025
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating...
21 KB (2,789 words) - 13:50, 11 April 2025
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
7 KB (687 words) - 23:11, 18 June 2025
July 2011. Digest access authentication was originally specified by RFC 2069 (An Extension to HTTP: Digest Access Authentication). RFC 2069 specifies roughly...
25 KB (2,879 words) - 04:06, 25 May 2025
Block cipher mode of operation (section Counter with cipher block chaining message authentication code (CCM))
Galois message authentication code (GMAC) is an authentication-only variant of the GCM which can form an incremental message authentication code. Both...
52 KB (5,828 words) - 12:52, 13 June 2025
Kerberos (protocol) (redirect from Kerberos authentication protocol)
and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping...
27 KB (3,023 words) - 15:26, 31 May 2025
MD5 (redirect from MD5 - A Message Digest Algorithm)
Canetti, Ran (February 1997). "RFC 2104 – HMAC: Keyed-Hashing for Message Authentication". Internet Engineering Task Force. doi:10.17487/RFC2104. Archived...
46 KB (4,710 words) - 10:55, 16 June 2025
(privacy-only) encryption scheme and a message authentication code (MAC) T. Kohno; J. Viega & D. Whiting. "The CWC Authenticated Encryption (Associated Data) Mode"...
19 KB (2,087 words) - 09:30, 22 June 2025
may log in using any authentication mechanism supported by the server. It is mainly used by submission servers, where authentication is mandatory. SMTP...
10 KB (1,229 words) - 16:16, 6 December 2024
Scytale (section Message authentication hypothesis)
that the scytale was used for message authentication rather than encryption. Only if the sender wrote the message around a scytale of the same diameter...
5 KB (727 words) - 08:20, 5 June 2025
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident...
3 KB (327 words) - 01:03, 22 December 2024
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
34 KB (4,172 words) - 20:50, 1 May 2025
indicating a person or thing's identity, authentication is the process of verifying that identity. Authentication is relevant to multiple fields. In art...
35 KB (4,025 words) - 21:20, 19 June 2025
Internet security (section Message Authentication Code)
message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient. A Message authentication...
24 KB (2,637 words) - 08:14, 15 June 2025
Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website...
44 KB (4,843 words) - 10:45, 24 June 2025
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at...
24 KB (3,032 words) - 11:26, 14 March 2025
(or has integrity) because each message transmitted includes a message integrity check using a message authentication code to prevent undetected loss...
178 KB (17,519 words) - 21:07, 27 June 2025
ISO/IEC 9797-1 (category Message authentication codes)
ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher is an international...
10 KB (1,232 words) - 00:23, 8 July 2024
for any message Y ∉ {Xi} which they have not seen before. SipHash computes a 64-bit message authentication code from a variable-length message and 128-bit...
14 KB (1,342 words) - 17:18, 17 February 2025
RADIUS (redirect from Remote Authentication Dial In User Service)
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
33 KB (2,792 words) - 14:22, 16 September 2024
Real-time Transport Protocol (RTP) intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both...
8 KB (1,132 words) - 15:59, 23 July 2024
Enigma machine (redirect from Enigma message)
for each message. The receiving station would have to know and use the exact settings employed by the transmitting station to decrypt a message. Although...
93 KB (11,282 words) - 06:35, 28 June 2025
The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. DAA is defined in...
1 KB (129 words) - 18:25, 29 April 2024