📝HMAC

tags

§ Cryptography

RFC

RFC 2104 - HMAC: Keyed-Hashing for Message Authentication

  • Hash-based Message Authentication Code

  • Can be used to verify both data integrity and authenticity of a message.

  • Can be used with any cryptographic hash function.

  • size of the HMAC output is the same as that of the hash function

  • HMAC does not encode message. The message should be sent along with the HMAC. All other parties will hash the message and should receive the same HMAC value.

  • HMAC is not vulnerable to Length extension attack

  • inputs:

    • key

    • message

  • output:

    • HMAC hash value of fixed length

Algorithm:

  • two pads are produced from the key (outer and inner) by xoring key with byte-filled arrays of 0x5c and 0x36 respectively.

    • these constants are computed so that pads have large hamming distance

  • HMAC(key,data)=Hash(opadHash(ipaddata))\mathrm{HMAC}(key, data) = \mathrm{Hash}(opad || \mathrm{Hash}(ipad || data)) where || is concatenation

Backlinks