MAC and Hash function

Illustrate the differences between the MAC and Hash function?

E

Expert

Verified

MAC : In Message Authentication Code or MAC, secret key is shared by the sender and receiver. The MAC is added to the message at the source during the time when the message is supposed or identified to be correct.

Hash Function : The hash value is added to the message at source at time when the message is assumed or known to be correct. The hash function itself is not regarded as the secret.

   Related Questions in Computer Network Security

  • Q : Steps for preparing envelope data MIME

    Specify the steps used for preparing the envelope data MIME?

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Services by PGP Specify the services

    Specify the services which are offered by the PGP services?

  • Q : Problems with one-time pad Explain the

    Explain the two problems which are there along with the one-time pad?

  • Q : MIME content type State the MIME

    State the MIME content type &explain?

  • Q : What is power analysis Explain the term

    Explain the term power analysis?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

©TutorsGlobe All rights reserved 2022-2023.