Hello,

I need a MAC (Message authentication code) for files, this codes uses
to be a Hash (SHA, MD...) or a CRC. what I want to know here is what
things I need to take in account to choose one or another MAC.

Please note that googling MAC brings up pages about Macintosh,
googling authentication brings up pages about user authentication.
googling hash CRC brings up info about specific algorithms (straight
to implementation).

And what I want to know how to choose an algorithm. You know something
like weakeness comparison and known attacks.

I hope you can help with some material on the matter.
Thanks.

Reply via email to