--%>

MAC and Hash function

Illustrate the differences between the MAC and Hash function?

E

Expert

Verified

MAC : In Message Authentication Code or MAC, secret key is shared by the sender and receiver. The MAC is added to the message at the source during the time when the message is supposed or identified to be correct.

Hash Function : The hash value is added to the message at source at time when the message is assumed or known to be correct. The hash function itself is not regarded as the secret.

   Related Questions in Computer Network Security

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.  

  • Q : What is Wimax Backhaul Briefly explain

    Briefly explain about Wimax Backhaul?

  • Q : Building Wireless Network What kind of

    What kind of Hardware is required to build a Wireless Network?

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Construction of S-box Explain how the

    Explain how the S-box is constructed?

  • Q : Ethics of information technology i need

    i need a rational diagram for this assignment.can u plz help me out.job id is TG12WAH514COM

  • Q : What is message authentication Explain

    Explain what is meant by the term message authentication? Describe the classes of message authentication function.

  • Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Steps for preparing envelope data MIME

    Specify the steps used for preparing the envelope data MIME?