integrityauthentication
Integrity authentication refers to mechanisms that ensure data has not been altered in transit or storage and that it originates from a claimed source. The term is used to describe systems that provide both data integrity and origin authentication, combining checksums or hashes with cryptographic proofs of provenance; it is distinct from integrity-only checks or identity verification alone. In some contexts, the concept is referred to as integrityauthentication.
Techniques include message authentication codes (MACs) and HMACs, which use a shared secret to confirm data
In practice, integrity authentication is used in protocols such as TLS, IPsec, and SSH, as well as
Standards include HMAC (RFC 2104), and various digital signature and AEAD standards (RSA, ECDSA, AES-GCM, ChaCha20-Poly1305).