Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

HMAC

Index HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. [1]

34 relations: Alex Biryukov, ASCII, Authentication, Bart Preneel, Concatenation, Cryptographic hash function, Data integrity, Digital signature forgery, Exclusive or, Federal Information Processing Standards, Hamming distance, HAVAL, Hexadecimal, International Cryptology Conference, IPsec, Key (cryptography), Key size, Length extension attack, MD4, MD5, Message authentication code, Mihir Bellare, National Institute of Standards and Technology, Plaintext, Preimage attack, Pseudocode, Pseudorandom function family, SHA-1, SHA-3, Stochastic process, Strong cryptography, Transport Layer Security, UTF-8, Xiaoyun Wang.

Alex Biryukov

Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg.

New!!: HMAC and Alex Biryukov · See more »

ASCII

ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

New!!: HMAC and ASCII · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: HMAC and Authentication · See more »

Bart Preneel

Bart Preneel (born 15 October 1963) is a Flemish cryptographer and cryptanalyst.

New!!: HMAC and Bart Preneel · See more »

Concatenation

In formal language theory and computer programming, string concatenation is the operation of joining character strings end-to-end.

New!!: HMAC and Concatenation · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: HMAC and Cryptographic hash function · See more »

Data integrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

New!!: HMAC and Data integrity · See more »

Digital signature forgery

In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, m, and a signature (or MAC), \sigma, that is valid for m, where m has not been signed in the past by the legitimate signer.

New!!: HMAC and Digital signature forgery · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: HMAC and Exclusive or · See more »

Federal Information Processing Standards

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

New!!: HMAC and Federal Information Processing Standards · See more »

Hamming distance

In information theory, the Hamming distance between two strings of equal length is the number of positions at which the corresponding symbols are different.

New!!: HMAC and Hamming distance · See more »

HAVAL

HAVAL is a cryptographic hash function.

New!!: HMAC and HAVAL · See more »

Hexadecimal

In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.

New!!: HMAC and Hexadecimal · See more »

International Cryptology Conference

CRYPTO, the International Cryptology Conference, is one of the largest academic conferences in cryptography and cryptanalysis.

New!!: HMAC and International Cryptology Conference · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: HMAC and IPsec · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: HMAC and Key (cryptography) · See more »

Key size

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

New!!: HMAC and Key size · See more »

Length extension attack

In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of message1 to calculate Hash(message1 ‖ message2) for an attacker-controlled message2.

New!!: HMAC and Length extension attack · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: HMAC and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: HMAC and MD5 · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: HMAC and Message authentication code · See more »

Mihir Bellare

Mihir Bellare is a cryptographer and professor at the University of California San Diego.

New!!: HMAC and Mihir Bellare · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: HMAC and National Institute of Standards and Technology · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: HMAC and Plaintext · See more »

Preimage attack

In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value.

New!!: HMAC and Preimage attack · See more »

Pseudocode

Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm.

New!!: HMAC and Pseudocode · See more »

Pseudorandom function family

In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in the following way: no efficient algorithm can distinguish (with significant advantage) between a function chosen randomly from the PRF family and a random oracle (a function whose outputs are fixed completely at random).

New!!: HMAC and Pseudorandom function family · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: HMAC and SHA-1 · See more »

SHA-3

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015.

New!!: HMAC and SHA-3 · See more »

Stochastic process

--> In probability theory and related fields, a stochastic or random process is a mathematical object usually defined as a collection of random variables.

New!!: HMAC and Stochastic process · See more »

Strong cryptography

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.

New!!: HMAC and Strong cryptography · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: HMAC and Transport Layer Security · See more »

UTF-8

UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.

New!!: HMAC and UTF-8 · See more »

Xiaoyun Wang

Xiaoyun Wang (born 1966) is a researcher and professor in the Department of Mathematics and System Science, Shandong University, Shandong, China.

New!!: HMAC and Xiaoyun Wang · See more »

Redirects here:

HMAC MD5, HMAC SHA1, HMAC SHA256, HMAC md5, HMAC-MD5, HMAC-SHA1, HMAC-SHA256, HMAC-md5, Hash-based message authentication code, Hashed message authentication code, Hmac, Hmac MD5, Hmac md5, Hmac-MD5, Hmac-md5, KHMAC, Keyed-Hashing Message Authentication, Keyed-hash message authentication code, NMAC.

References

[1] https://en.wikipedia.org/wiki/HMAC

OutgoingIncoming
Hey! We are on Facebook now! »