Comparison Between Various Message Authentication Code (MAC) Generation Methods
Comparison Between Various Message Authentication Code (MAC) Generation Methods
Abstract—MAC (Message Authentication Code) about the secrecy of the email they sent, but they
Algorithm is an algorithm which accepts a private key and a definitely want to be sure that the email they received was
message to be authenticated, and later extracts a MAC tag. indeed the one being sent. It may seem that encryption
The value of a MAC protects the data integrity and also the
also provides the aspect of protecting data integrity, but
content of the message. Despites its similarity with hash
functions, both algorithm has different security needs. To be that is not always the case. Once an attacker finds out the
considered secure, a MAC function has to be able to survive algorithm used to encrypt the data, he can afterwards use
chosen-plaintext attack. This means that although an the algorithm to create fake data and intercepts the real
attacker knows the MAC value of a message, it has to take message being sent.
him a lot amount of effort to crack other messages. MAC is There are many different methods to generate message
also different from a digital signature, because MAC is
authentication code, a couple examples are using block-
generated and verified using the same private key.
There are several different methods that can be applied to cipher algorithm or hash functions. In this paper we shall
generate MAC value, for example by using the block-cipher discuss the advantages and disadvantages of each method
algorithm (OMAC, CBC-MAC, and PMAC), or using hash which can be used to generate a MAC value. Furthermore
value (HMAC). In this paper we shall discuss the advantages this paper will discuss the possibility of a modified MAC
and disadvantages of each method, also the possibility of generation method.
creating new MAC generation method.
who does not possess the secret key K can figure out
chunks of messages and its MAC value. Said attacker can
be assumed to have compiled several examples of text Nomor teleponku 09c88f0b91d74b292
Fungsi hash
08122113451 e6f89587ab63921
and its valid MAC value by executing an act of
observation to the dataflow path between the sender and
the receiver. "Tsunami" menjadi
a996de118c61eac49
kata yang populer Fungsi hash
Further information that we can use to ensure the di Indonesia saat ini
63989aa2d73e67e
VII. ACKNOWLEDGMENT
In the making of this paper, author thanks google.com
for always being a reliable search engine; a very useful
one also. Wikipedia.org for being a very resourceful
website, although many had said that it is not always
reliable. Author thanks her parents and sister for the
understanding they had given in during the author’s
campus life and its never-ending stream of tasks. Also for
every friends who spent the nights together working on
the tasks, especially the certain friend who never mind
driving halfway across Bandung to drive me home. It
would have been a lot harder to finish this paper without
the aid of said people. Thank you very much.
REFERENCES
Munir, Rinaldi. 2004. Bahan Kuliah IF3058 Kriptografi. Departemen
Teknik Informatika, Institut Teknologi Bandung.
Rifki, Guntur. 2009. Implementasi Algoritma Enkripsi Rijndael dan
Metode Otentikasi MAC(Message Authentication Code) dalam
SMS. Institut Teknologi Telkom.
Safrina, Rika. 2007. Cryptography Paper: ―Pembangunan Algoritma
MAC Berbasis Cipher Aliran‖. Institut Teknologi Bandung.
http://www.cs.princeton.edu/courses/archive/fall07/cos433/lec8.pdf
https://tao.truststc.org/Members/yuanxue/network_security/Public%20re
sources/lecture10_folder/lecture10_notes/download