Crypto U6, computing HMAC

Description

IYM002 Note on Crypto U6, computing HMAC, created by jjanesko on 11/05/2013.
jjanesko
Note by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko almost 11 years ago
83
1

Resource summary

Page 1

How to compute an HMACYou need to keys, let's call them  K1 and K2.   Concatenate K2 with the message and then compute the hash of this. Then take K1, concatenate it with the result from step 1 and hash this value. Ultimately, it looks like this:  h( K1  ||  h( K2 || m) )

New Page

Show full summary Hide full summary

Similar

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko