Show simple item record

The Keyed-Hash Message Authentication Code (HMAC)

contributor authorAIR FORCE - 99 - Air Force Materiel Command HQ
date accessioned2017-09-04T16:51:55Z
date available2017-09-04T16:51:55Z
date copyright07/01/2008
date issued2008
identifier otherBUWVAFAAAAAAAAAA.pdf
identifier urihttp://yse.yabesh.ir/std/handle/yse/115502
description abstractINTRODUCTION
Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity checks based on a secret key are usually called message authentication codes (MACs). Typically, message authentication codes are used between two parties that share a secret key in order to authenticate information transmitted between these parties. This Standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key. This mechanism is called HMAC [HMAC]. HMAC shall use an Approved cryptographic hash function [FIPS 180-3]. HMAC uses the secret key for the calculation and verification of the MACs.
languageEnglish
titleFIPS PUB 198-1num
titleThe Keyed-Hash Message Authentication Code (HMAC)en
typestandard
page13
statusActive
treeAIR FORCE - 99 - Air Force Materiel Command HQ:;2008
contenttypefulltext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record