Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Product List
SAM9G46-SAM9M11-Slide7

In this example, the sender of a message runs a MAC algorithm to produce a MAC data tag. The message and the MAC tag are then sent to the receiver. The receiver in turn runs the message portion of the transmission through the same MAC algorithm using the same secret key, producing a second MAC data tag. The receiver then compares the first MAC tag received in the transmission to the second generated MAC tag. If they are identical, the receiver can safely assume that the integrity of the message was not compromised and the message was not altered or tampered with during transmission. In addition, sharing the same secret key allows the system to authenticate the source of the message.

PTM Published on: 2011-09-29