This chapter covers:
- Message Authentication Codes (MAC), a cryptographic primitive to protect the integrity of data.
- The security properties and the pitfalls of MACs.
- The widely adopted standards for MACs.
pre-requesites:
- Chapter 2 on Hash Functions.
In the previous Chapter 2, we’ve seen an interesting construction (a hash function) that on its own does not provide much, but if used in combination with a secure channel allows us to verify the authenticity and integrity of messages. In this chapter, we will see how one can provide integrity and authenticity over messages without the use of a secure channel.