Computer security(7): HMAC algorithm
分类:
文章
•
2024-06-24 07:43:46
HMAC
The processing of HMAC
The aims of HAMC
- To use, without modifications, available hash functions.
- To preserve the original performance of the hash function without incurring a significant degradation.
- To use and handle keys in a simple way.
- To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required.
- To have a well-understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions on the embedded hash function.
The structure of HMAC
Specials of explanation
The security of this HMAC