Crypto U6, computing HMAC

Beschreibung

IYM002 Notiz am Crypto U6, computing HMAC, erstellt von jjanesko am 11/05/2013.
jjanesko
Notiz von jjanesko, aktualisiert more than 1 year ago
jjanesko
Erstellt von jjanesko vor etwa 11 Jahre
83
1

Zusammenfassung der Ressource

Seite 1

How to compute an HMACYou need to keys, let's call them  K1 and K2.   Concatenate K2 with the message and then compute the hash of this. Then take K1, concatenate it with the result from step 1 and hash this value. Ultimately, it looks like this:  h( K1  ||  h( K2 || m) )

New Page

Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko