Data integrity authentication scheme
Unfortunately, there's no good way to do what you want. There are a number of ways do data integrity and authentication, but all the reliable ones require adding to the data. The addition can be of small fixed size, but you must add to the size of the data. There are, however, other schemes that allow data to shrink -- if your data is large enough, you could compress it and get back more than the size of the MAC. But this isn't guaranteed.
Dig Deeper on Data security technology and strategy
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.
Meet all of our Information Security experts
Start the conversation
0 comments