Computer security(7): HMAC algorithm

HMAC

Computer security(7): HMAC algorithm

The processing of HMAC

Computer security(7): HMAC algorithm

The aims of HAMC

  1. To use, without modifications, available hash functions.
  2. To preserve the original performance of the hash function without incurring a significant degradation.
  3. To use and handle keys in a simple way.
  4. To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required.
  5. To have a well-understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions on the embedded hash function.

The structure of HMAC

Computer security(7): HMAC algorithm

Specials of explanation

Computer security(7): HMAC algorithm
Computer security(7): HMAC algorithm

The security of this HMAC

Computer security(7): HMAC algorithm