By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Unfortunately, there's no good way to do what you want. There are a number of ways do data integrity and authentication, but all the reliable ones require adding to the data. The addition can be of small fixed size, but you must add to the size of the data. There are, however, other schemes that allow data to shrink -- if your data is large enough, you could compress it and get back more than the size of the MAC. But this isn't guaranteed.
Dig Deeper on Data security technology and strategy
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.