In a network security protocol such as IPsec, a MAC may be used to provide integrity protection and origin authentication of messages sent between two peers that have previously established a shared private key.
In a network security protocol such as IPsec, a MAC may be used to provide integrity protection and origin authentication of messages sent between two peers that have previously established a shared private key.