# Authentication Code

Authentication Code definition in **Computer Security** terms:

Acronym(s): *None*

Definition(s): A cryptographic checksum based on an Approved security function (also known as a Message Authentication Code).

**Source(s):** FIPS 140-2

NIST SP 800-57 Part 1 Rev. 3

NIST SP 800-57 Part 2

Synonym(s): Message Authentication Code

A cryptographic checksum that results from passing data through a message authentication algorithm. In this Standard, the message authentication algorithm is called HMAC, while the result of applying HMAC is called the MAC.

**Source(s):** FIPS 198-1 A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data of arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity.

**Source(s):** NIST SP 800-108 A cryptographic checksum that is generated on data using a cryptographic algorithm that is parameterized by a symmetric key. The message authentication code is designed to provide data origin authentication and detect both accidental errors and the intentional modification of the data.

**Source(s):** NIST SP 800-132 A data authenticates generated from the message, usually through cryptographic techniques. In general, a cryptographic key is also required as an input.

**Source(s):** NIST SP 800-15 A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data.

**Source(s):** NIST SP 800-152 NIST SP 800-57 Part 1 Rev. 3 NIST SP 800-57 Part 3 Rev. 1 A bit string of fixed length, computed by a MAC generation algorithm, that is used to establish the authenticity and, hence, the integrity of a message.

**Source(s):** NIST SP 800-38B A cryptographic checksum on data that is designed to reveal both accidental errors and intentional modifications of the data.

**Source(s):** NIST SP 800-38C A family of cryptographic algorithms that is parameterized by a symmetric key. Each of the algorithms can act on input data (called a message) of an arbitrary length to produce an output value of a specified length (called the MAC of the input data). A MAC algorithm can be used to provide data origin authentication and data integrity protection. In this Recommendation, a MAC algorithm is also called a MAC function.

**Source(s):** NIST SP 800-56C A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.

**Source(s):** NIST SP 800-63-2 A MAC address is a (hopefully) unique 48-bit value that is permanently assigned to a particular wireless network interface.

**Source(s):** NIST SP 800-97 A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.

**Source(s):** CNSSI 4009-2015

reference: CSRC Glossary

Comments are closed here.