By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Unfortunately, there's no good way to do what you want. There are a number of ways do data integrity and authentication, but all the reliable ones require adding to the data. The addition can be of small fixed size, but you must add to the size of the data. There are, however, other schemes that allow data to shrink -- if your data is large enough, you could compress it and get back more than the size of the MAC. But this isn't guaranteed.
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.