Mac vs hash9/16/2023 ![]() I don't think there's much of a distinction between integrity vs authenticity, when we're dealing with an active attacker who might modify messages transmitted. +6 – I don't know that that's the best way of looking at it.Most MAC alghoritms - is a combination of hash function with a secret key, which I call for simplicity "encryption" of hash value with a key en./wiki/File:MAC.svg - at 12:37 user1195 (391 ) +2 – Hash is used to ensure message integrity, MAC is used for both integrity and authenticy.This is not a helpful way to think about a MAC, nor is it typically how a MAC algorithm works.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |