Explore chapters and articles related to this topic
Message Authentication
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
HMAC means applying a message authentication code algorithm using only cryptographic hash functions. Using Message authentication code with hash functions is more efficient than using Message authentication code with block ciphers because hash functions like MD5 and SHA-1 are much faster than block cipher cryptographic functions like DES. While designing hash functions like SHA, its usage as MAC was not kept in mind and hence it cannot be used for the same purpose directly as its usage does not include a secret key. Various proposals were presented so as hoe to incorporate secret key into hash functions. HMAC is compulsory to implement MAC for IP security and for many other Internet protocols.
Cryptography Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Konstantinos Limniotis, Nicholas Kolokotronis
The properties of HMAC imply that they provide the means for ensuring the integrity of a message exchanged between two peers (i.e. the users having knowledge of the secret key8)—since any modification of the transmitted data will be detectable by checking the MAC output (the MAC of the modified data will not coincide with the MAC of the original data, due to the collision resistance property). Only the peers having the secret key can generate a valid MAC output of any message, as well as they can verify the validity of the MAC output of a message9.
Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning
Published in IETE Journal of Research, 2018
Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal, Yahya Kord Tamandani
It is a function of message authentication for the Internet communications. HMAC uses standard functions of message digest, such as SHA-1, SHA-2, MD5, and many others. HMAC focused a lot on the technology of Internet security, such as the IPSec protocols and transport layer security (TLS), to ensure the integrity of data during transmission. HMAC produces a message digest for each individual block of transferred data and uses the random secret key to do message digest encryption [21,22]. As soon as data are received, the secret symmetric key does the message digest decryption and calculates the check for data integrity. HMAC is ensuring the data integrity and authentication of a message. HMAC could be calculated as belowwhere H is hash function, K+ is a secret key filled up toward the right with many zeroes to be equal the size of input block for hash function or the result of hashing the original key if it is bigger than the block size, M is message which needs to be authenticated. ipad is a fixed number 00110110, opad is a fixed number 01011100, ⊕ is exclusive or (XOR), and II is concatenation [23].