This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Data Authentication Algorithm" – news · newspapers · books · scholar · JSTOR(July 2021) (Learn how and when to remove this message)
This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources. Find sources: "Data Authentication Algorithm" – news · newspapers · books · scholar · JSTOR(April 2024)
The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. DAA is defined in FIPS PUB 113,[1] which was withdrawn on September 1, 2008.[citation needed] The algorithm is not considered secure by today's standards.[citation needed]
According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm chain encrypts the data, with the last cipher block truncated and used as the DAC.
The DAA is equivalent to ISO/IEC 9797-1 MAC algorithm 1, or CBC-MAC, with DES as the underlying cipher, truncated to between 24 and 56 bits (inclusive).
^FIPS PUB 113 – Computer Data Authentication – the Federal Information Processing Standard publication that defines the Data Authentication Algorithm
and 21 Related for: Data Authentication Algorithm information
cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking...
perform various functions: Authentication Header (AH) provides connectionless data integrity and data origin authentication for IP datagrams and provides...
symmetric encryption algorithm. The authentication key is only shared by exactly two parties (e.g. communicating devices), and the authentication will fail in...
addition, cipher suites can include signatures and an authenticationalgorithm to help authenticate the server and or client. Overall, there are hundreds...
Output: ciphertext and authentication tag (message authentication code or MAC). Decryption Input: ciphertext, key, authentication tag, and optionally a...
based on passwords FIPS PUB 113 Computer DataAuthentication 1985, specifies a DataAuthenticationAlgorithm (DAA) based on DES, adopted by the Department...
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
Ratchet Algorithm uses for the DH ratchet Elliptic curve Diffie-Hellman (ECDH) with Curve25519, for message authentication codes (MAC, authentication) Keyed-hash...
message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm designed...
message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms are designed...
chaining message authentication code (counter with CBC-MAC; CCM) is an authenticated encryption algorithm designed to provide both authentication and confidentiality...
An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving...
Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a...
Message authentication codes (symmetric authenticationalgorithms, which take a key as a parameter): HMAC: keyed-hash message authentication Poly1305...
The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of...
format for disk images DataAuthenticationAlgorithm, a former American standard for authentication codes Digest access authentication, protocol for negotiating...
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
authentication layer (RFC 4252) handles client authentication, and provides a suite of authenticationalgorithms. Authentication is client-driven: when one is prompted...