This lecture explains Message Authentication Requirements and Functions, Message Encryption and Authentication Code and Security of MACs for Brute-Force Attacks and Cryptanalysis. It also explains MACs Based on Hash Functions, MACs Based on Block Ciphers: DAA and CMAC, Authenticated Encryption Counter with CBC-Message Authentication Code, Key Unwrapping and Wrapping Algorithm and Pseudorandom Number Generation Using Hash Functions and MACs.