It trades off the need for a complex public key infrastructure by delegating the key exchange to the communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication.Īny cryptographic hash function, such as SHA-2 or SHA-3, may be used in the calculation of an HMAC the resulting MAC algorithm is termed HMAC-X, where X is the hash function used (e.g. HMAC can provide authentication using a shared secret instead of using digital signatures with asymmetric cryptography. As with any MAC, it may be used to simultaneously verify both the data integrity and authenticity of a message. In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |