A method of implementing MAC with MAC(message,key)=Hash(message∣∣key) Formal Definition m=h(x∣∣k)=h(x1∣∣…∣∣xn∣∣k) In case of message x being larger than blocksize (like 512 for SHA) Vulnerabilities Secret Suffix Forgery Attack