Infosec glossary entry

CBC-MAC

CBC-MAC:
Cipher Block Chaining Message Authentication Code

CBC-MAC is a cryptographic algorithm used to ensure the integrity and authenticity of a message. It combines the principles of block cipher encryption with a specific method of chaining the blocks together. In this process, the message is divided into fixed-size blocks, and each block is encrypted in such a way that the encryption of one block depends on the previous block's output. This chaining mechanism creates a unique authentication tag for the entire message, which can be used to verify that the message has not been altered during transmission.

When a sender transmits a message, they compute the CBC-MAC by applying the encryption process to the message blocks and then sending the resulting authentication tag along with the message. The recipient can then perform the same computation on the received message and compare the calculated tag with the one provided. If the tags match, it confirms that the message is authentic and has not been tampered with. CBC-MAC is particularly useful in scenarios where message integrity is critical, as it provides a robust way to detect any unauthorized modifications.


[...] is a technique for constructing a message authentication code from a block cipher. The message is encrypted with some block cipher algorithm in CBC mode to create a chain of blocks such that each block depends on the proper encryption of the previous block. This interdependence ensures that a change to any of the plaintext bits will cause the final encrypted block to change in a way that cannot be predicted or counteracted without knowing the key to the block cipher. https://book.hacktricks.xyz/cryptography/cipher-block-chaining-cbc-mac-priv

By jean-christoph

March 28, 2022

cryptography

this might interest you as well

Lessons from Sun Tzu’s “The Art of War” in Cybersecurity: Timeless Wisdom or Outdated Tactics?

Introduction Sun Tzu’s "The Art of War" is a legendary strategic treatise written more than 2,500 years ago. Its enduring principles of warfare strategy have transcended military boundaries, influencing disciplines from business management to competitive sports. In today’s digital age, its relevance is increasingly apparent in the cybersecurity landscape, particularly for CISOs of medium-sized enterprises,

Read More

Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity

Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime,

Read More

AI Cyber Security 2025: Key Threats and Essential Strategies for Your Business

Artificial Intelligence is transforming businesses and industries worldwide, but with this transformation comes unprecedented challenges. The recent launch of Cisco AI Defense, a specialized AI security solution, highlights the urgency of securing AI applications. According to Cisco, only 29% of enterprises feel fully prepared to detect and prevent unauthorized manipulations of AI systems. This low

Read More