About 176,000 results
Open links in new tab
  1. How and when do I use HMAC? - Information Security Stack …

    I was reading HMAC on wikipedia and I was confused about a few points. Where do I use HMAC? Why is the key part of the hash? Even if someone successfully used a "length-extension …

  2. What is the difference between MAC and HMAC?

    Note that HMAC is a specific scheme as Seth correctly describes; SHA-3 uses KMAC which is therefore another hash based MAC. Maybe the acronyms CBMAC and HBMAC could be used …

  3. HMAC and integrity - Information Security Stack Exchange

    Nov 6, 2019 · All resources that I found online, say only that HMAC guarantee integrity, but I don't understand in what way. I founded this answear here and I understand this : If Alice sends the …

  4. HMAC Key Sizes for MD5, SHA1, SHA224|256|384|512

    SHA512 HMAC uses a ____ bit key and produces a 512 bit digest But I am unable to find definitive key sizes for SHA224, SHA384, and SHA512. The HMAC RFC (2104) lists this: We …

  5. What size should the HMAC key be with SHA-256?

    Dec 23, 2015 · I'm trying to generate a secret key to be used for HMAC SHA-256 signature processing. I've seen many sample of keys with variable length from 32 characters to 96 …

  6. collision resistance - Why is HMAC-SHA1 still considered secure ...

    Should we close this as a duplicate of Is HMAC-MD5 considered secure for authenticating encrypted data?? While this question is about SHA1, not MD5, the answer is nearly the same.

  7. Use cases for CMAC vs. HMAC? - Cryptography Stack Exchange

    Apr 22, 2014 · Use cases for CMAC vs. HMAC? Ask Question Asked 11 years, 3 months ago Modified 5 years, 3 months ago

  8. Which algorithm has better performance (HMAC, UMAC, and …

    Mar 13, 2018 · I want to implement a protocol which requires Integrity and Authentication for its messages. I found a lot of algorithms such as HMAC, UMAC, and Poly1305 which provide …

  9. hash - Does adding a salt to the message before HMAC …

    An HMAC function is designed to verify message integrity, i.e., that the message has not been tampered with. It is generally (always?) implemented by using a hashing function H, and …

  10. Is HMAC-MD5 still secure for commitment or other common uses?

    May 12, 2015 · Is HMAC-MD5 (or more in general, HMAC with a non-collision-resistant hash function) still a secure way to do commitments? This is important because, for example, …