Title: HMAC: Keyed-Hashing for Message Authentication
Author(s): H. Krawczyk, M. Bellare, R. Canetti.
Status: INFORMATIONAL
Date: Feb 1997
Length: 22297
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
|
|
|