Talk:Message Integrity Code

Page contents not supported in other languages.
Source: Wikipedia, the free encyclopedia.

Is a MIC also sometimes known as a Message Integrity Check? - danyoung - 12:54, 25 May 2006 (UTC)[reply]

Cleanup

Some statements in the article are unclear or out of context:

The MIC is created by the sequential XOR of each data block with the subsequent block with the encryption of its resultant.

First, this statement is confusing. It may refer to what is commonly known as CBC-MAC, or it may refer to some other scheme. Secondly, it just describes one particular scheme out of many proposed MAC/MICs. This should be clarfied e.g. with a statement that a commonly used MIC in wireless is ...

The process is continued until all data blocks are encrypted and consequently the MIC has been produced and it enables the counter measure to shut the particular ESSID for a duration approx 15 minutes.

This statement talks about a specific protocol without naming the protocol. It does not fit into an article that should just describe what a MIC is. If MICs really just have the same function as MACs then a stub and a link to MACs should be sufficient. Otherwise it should be described what the difference between the two schemes is. 85.0.109.99 08:08, 2 June 2007 (UTC)[reply]

This seems confus{ed,ing} enough that I have just redirected to
Message Authentication Code. –Henning Makholm 12:38, 3 August 2007 (UTC)[reply
]