--%>

MAC and Hash function

Illustrate the differences between the MAC and Hash function?

E

Expert

Verified

MAC : In Message Authentication Code or MAC, secret key is shared by the sender and receiver. The MAC is added to the message at the source during the time when the message is supposed or identified to be correct.

Hash Function : The hash value is added to the message at source at time when the message is assumed or known to be correct. The hash function itself is not regarded as the secret.

   Related Questions in Computer Network Security

  • Q : Headers fields in MME Explain the

    Explain the headers fields which are defined within the MME?

  • Q : Wireless Information Security System

    Wireless Information Security System: In any wireless network only secure authorized usage should be given and the company should make sure o putting the best practices into use. The access points should not be given access without putting it through

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : What is versioned certificate Explain

    Explain what is meant by versioned certificate?

  • Q : LAN and WAN components LO5: Design a

    LO5: Design a small routable network comprising LAN and WAN components Overview This case study based assignment assesses the student's ability to design the logical and physical netw

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : Operations in Blowfish Explain the

    Explain the primitive operations which are used in the Blowfish?

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an