--%>

MAC and Hash function

Illustrate the differences between the MAC and Hash function?

E

Expert

Verified

MAC : In Message Authentication Code or MAC, secret key is shared by the sender and receiver. The MAC is added to the message at the source during the time when the message is supposed or identified to be correct.

Hash Function : The hash value is added to the message at source at time when the message is assumed or known to be correct. The hash function itself is not regarded as the secret.

   Related Questions in Computer Network Security

  • Q : IP security services List the protocols

    List the protocols which are used to provide the IP security? Explain the IP security services?

  • Q : Function areas of IP security Specify

    Specify various function areas of the IP security?

  • Q : Problems related to Cryptography and

    A) Provide a specific illustration of how inference control might be implemented in the database.B) For a public-key encryption system (like PGP), list some areas for and against utilizing the similar key pair for both encryption and signature.

  • Q : Number of keys required to communicate

    Specify the number of keys required for the two people to communicate through a cipher?

  • Q : Block cipher modes Explain why some

    Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.  

  • Q : Computer crime Explain the term

    Explain the term Computer crime and what are the Suggestion to stop them ?

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Encryption Explain the term Encryption .

    Explain the term Encryption.