[1] Message authentication does not necessarily include the property of non-repudiation.
[4] It is based on using a cryptographic hash or symmetric encryption algorithm.
[5] The authentication key is only shared by exactly two parties (e.g. communicating devices), and the authentication will fail in the existence of a third party possessing the key since the algorithm will no longer be able to detect forgeries (i.e. to be able to validate the unique source of the message).
[6] In addition, the key must also be randomly generated to avoid its recovery through brute-force searches and related-key attacks designed to identify it from the messages transiting the medium.
Data origin authentication and non-repudiation have been also studied in the framework of quantum cryptography.