FIPS PUB 198-1
The Keyed-Hash Message Authentication Code (HMAC)
Organization:
AIR FORCE - 99 - Air Force Materiel Command HQ
Year: 2008
Abstract: INTRODUCTION
Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity checks based on a secret key are usually called message authentication codes (MACs). Typically, message authentication codes are used between two parties that share a secret key in order to authenticate information transmitted between these parties. This Standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key. This mechanism is called HMAC [HMAC]. HMAC shall use an Approved cryptographic hash function [FIPS 180-3]. HMAC uses the secret key for the calculation and verification of the MACs.
Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity checks based on a secret key are usually called message authentication codes (MACs). Typically, message authentication codes are used between two parties that share a secret key in order to authenticate information transmitted between these parties. This Standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key. This mechanism is called HMAC [HMAC]. HMAC shall use an Approved cryptographic hash function [FIPS 180-3]. HMAC uses the secret key for the calculation and verification of the MACs.
Collections
:
Show full item record
contributor author | AIR FORCE - 99 - Air Force Materiel Command HQ | |
date accessioned | 2017-09-04T16:51:55Z | |
date available | 2017-09-04T16:51:55Z | |
date copyright | 07/01/2008 | |
date issued | 2008 | |
identifier other | BUWVAFAAAAAAAAAA.pdf | |
identifier uri | http://yse.yabesh.ir/std/handle/yse/115502 | |
description abstract | INTRODUCTION Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity checks based on a secret key are usually called message authentication codes (MACs). Typically, message authentication codes are used between two parties that share a secret key in order to authenticate information transmitted between these parties. This Standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key. This mechanism is called HMAC [HMAC]. HMAC shall use an Approved cryptographic hash function [FIPS 180-3]. HMAC uses the secret key for the calculation and verification of the MACs. | |
language | English | |
title | FIPS PUB 198-1 | num |
title | The Keyed-Hash Message Authentication Code (HMAC) | en |
type | standard | |
page | 13 | |
status | Active | |
tree | AIR FORCE - 99 - Air Force Materiel Command HQ:;2008 | |
contenttype | fulltext |