Message Authentication Code (MAC) Functions
MACs provide integrity checking, authentication
Sender sends x = MAC(key,message)
Infeasible to compute x without key
Recipient also computes MAC(key,message) and compares this with received x value
- if they’re the same, the originator must have known key
Like secret-key crypto, depends on a shared key
Many block ciphers are also used as MACs