About 170,000 results
Open links in new tab
  1. How and when do I use HMAC? - Information Security Stack …

    I was reading HMAC on wikipedia and I was confused about a few points. Where do I use HMAC? Why is the key part of the hash? Even if someone successfully used a "length-extension …

  2. What is the difference between MAC and HMAC?

    Note that HMAC is a specific scheme as Seth correctly describes; SHA-3 uses KMAC which is therefore another hash based MAC. Maybe the acronyms CBMAC and HBMAC could be used …

  3. Use cases for CMAC vs. HMAC? - Cryptography Stack Exchange

    Apr 22, 2014 · Use cases for CMAC vs. HMAC? Ask Question Asked 11 years, 5 months ago Modified 5 years, 5 months ago

  4. HMAC and integrity - Information Security Stack Exchange

    Nov 6, 2019 · All resources that I found online, say only that HMAC guarantee integrity, but I don't understand in what way. I founded this answear here and I understand this : If Alice sends the …

  5. collision resistance - Why is HMAC-SHA1 still considered secure ...

    When people say HMAC-MD5 or HMAC-SHA1 are still secure, they mean that they're still secure as PRF and MAC. The key assumption here is that the key is unknown to the attacker.

  6. HMAC Key Sizes for MD5, SHA1, SHA224|256|384|512

    SHA512 HMAC uses a ____ bit key and produces a 512 bit digest But I am unable to find definitive key sizes for SHA224, SHA384, and SHA512. The HMAC RFC (2104) lists this: We …

  7. Salted hashes vs HMAC? - Information Security Stack Exchange

    Most of discussions involving access credentials include references to "hashing salted passwords". Is this another way to referring to the HMAC algorithm or a totally different …

  8. What's the difference between HMAC-SHA256 (key, data) and …

    Jan 20, 2015 · Then HMAC is defined as: HASH(Key XOR opad, HASH(Key XOR ipad, text)) or, in detail from the RFC, (Pretext: The definition of HMAC requires a cryptographic hash …

  9. hash - HMAC-SHA1 vs HMAC-SHA256 - Cryptography Stack …

    I have three questions: Would you use HMAC-SHA1 or HMAC-SHA256 for message authentication? How much HMAC-SHA256 is slower than HMAC-SHA1? Are the security …

  10. Should I use HMAC or KMAC for SHA-3? - Cryptography Stack …

    It is more efficient than HMAC by removing the need for HMAC's nested construction. So if I want to implement a MAC function can I just use the first method? Just pad the message with key …