December 2017
Intermediate to advanced
410 pages
11h 5m
English
In the MAC approach, the sender computes a MAC from the original message. A MAC can only be computed with the associated secret key.
One important property of MAC is that it is not possible to compute a MAC of a message without knowing the secret key associated:

The Receiver has a key associated to decrypt the message. If the Attacker modifies the Message and MAC during the process, the receiver will not be able to compute the MAC from the key that he has. This means that the message is altered.
Read now
Unlock full access