Crypto U6, computing HMAC

jjanesko
Note by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko about 8 years ago
82
1

Description

IYM002 Note on Crypto U6, computing HMAC, created by jjanesko on 05/11/2013.

Resource summary

Page 1

How to compute an HMACYou need to keys, let's call them  K1 and K2.   Concatenate K2 with the message and then compute the hash of this. Then take K1, concatenate it with the result from step 1 and hash this value. Ultimately, it looks like this:  h( K1  ||  h( K2 || m) )

New Page

Show full summary Hide full summary

Similar

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
Luis Hudson
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko