Problem solve Get help with specific problems with your technologies, process and projects.

Data integrity authentication schemes.

In this Ask the Expert Q&A, Joel Dubin, our identity and access mangement expert examines various data integrity authentication schemes.

Is there a data integrity authentication scheme, like message authentication code (MAC), that will allow me to authenticate the integrity of the data without attaching MAC?
Message authentication code (MAC) is probably still your best bet if you want to authenticate the integrity of your data. However, if you'd prefer not to use MAC, another option is to use hashing algorithms.

The key is to check the integrity of your data, rather than authenticate the user. Hashing algorithms alone serve this purpose fine. Unlike MAC, they don't require keys to create the hash. Instead, they rely on standard, readily-available algorithms. A popular hashing algorithm is MD5, which is universally supported on both UNIX and Windows with standard tools, some already bundled with the operating system, others free for download on the Web. MD5 is a 128-bit one-way hash, which means it can only be encrypted, but it also doesn't need to be decrypted. But that's not the point because hashing isn't about confidentiality. It's about integrity. For example, the hashed message can be sent separately from the original message. The receiver can take the message, use an MD5 tool to hash it on their side, and then compare it with the hash sent with the original message. If the two match, then the message hasn't been touched or altered in transit.

This was last published in March 2006

Dig Deeper on Data security strategies and governance