About 164,000 results
Open links in new tab
  1. What is the difference between a HMAC and a hash of data?

    Please note that "HMAC" is a specific construction of a MAC (from a hash function), and most of your description applies to MACs in general. If we use HMAC-SHA3 or HMAC-SHA512-384, the length …

  2. What is the difference between MAC and HMAC?

    Note that HMAC is a specific scheme as Seth correctly describes; SHA-3 uses KMAC which is therefore another hash based MAC. Maybe the acronyms CBMAC and HBMAC could be used for Cipher …

  3. collision resistance - Why is HMAC-SHA1 still considered secure ...

    That said, the construct of HMAC-SHA1 is still considered safe to use (assuming a secret key) due to the security proof for HMAC which does not rely on collision resistance of the underlying PRF.

  4. Secure Configuration of Ciphers/MACs/Kex available in SSH

    Following on the heels of the previously posted question here, Taxonomy of Ciphers/MACs/Kex available in SSH?, I need some help to obtain the following design goals: Disable any 96-bit HMAC …

  5. How and when do I use HMAC? - Information Security Stack Exchange

    I was reading HMAC on wikipedia and I was confused about a few points. Where do I use HMAC? Why is the key part of the hash? Even if someone successfully used a "length-extension attack", how …

  6. authentication - HMAC - Why not HMAC for password storage ...

    HMAC may be used instead of a raw hash function to strengthen a password-verification system, but in a different setup. Given a system which checks passwords with salts and iterated hash functions, …

  7. authentication - HMAC What is secure manner to distribute shared …

    I am looking at ways to secure http communication using HMAC. My understanding is that in this scenario the client and the server both know a secret. This means the secret must be first generated...

  8. hash - Does adding a salt to the message before HMAC processing …

    An HMAC function is designed to verify message integrity, i.e., that the message has not been tampered with. It is generally (always?) implemented by using a hashing function H, and calculating the...

  9. Salted hashes vs HMAC? - Information Security Stack Exchange

    HMAC is a Message Authentication Code, which is meant for verifying integrity. This is a totally different kind of beast. However, it so happens that HMAC is built over hash functions, and can be considered …

  10. When to use HMAC alongside AES? - Information Security Stack …

    When receiving a registration request, first verify the HMAC (by recomputing it), then (and only then) proceed to the decryption step. Of course, all of this assumes that there is a key K, that your client …