I can think of where people use hashes and signatures. But where are MAC used in real life?
Are there any protocol in cryptography that uses MAC? Or examples where MACs are relevant?
I can think of where people use hashes and signatures. But where are MAC used in real life?
Are there any protocol in cryptography that uses MAC? Or examples where MACs are relevant?
MACs are used all the time. Any time you want authenticated encryption, that is you want to send messages that can't be tampered by an attacker who lacks your secret key, you need to apply a MAC to every message you send as well as check a MAC for every message you receive.
Examples that I use on a daily basis include:
user_data + MAC(user_data)(user data being, user ID, login time, expiry time) and then you can check the user by seeing that their session cookie has a MAC that validates their user info. (Granted an alternative way is to just generate a random UUID for each session and store that random UUID in the DB and check it every time). – dr jimbob Apr 28 '14 at 16:45