HMAC Algorithm Stands For Hashed or Hash Based Message Authentication Code
HMAC Algorithm Stands For Hashed or Hash Based Message Authentication Code
HMAC consists of twin benefits of Hashing and MAC, and thus is more secure than
any other authentication codes
HMAC has been chosen as the mandatory-to-implement MAC for IP security, and is
used in other Internet protocols, such as SSL
HMAC has been made compulsory to implement in IP security. The FIPS 198 NIST
• To allow for easy replaceability of the embedded hash function in case faster or
more secure hash functions are found or required.
A hash function such as SHA was not designed for use as a MAC and cannot
be used directly for that purpose, because it does not rely on a secret key.
There have been a number of proposals for the incorporation of a secret key into
an existing hash algorithm. The approach that has received the most support is
HMAC
HMAC algorithm –
The working of HMAC starts with taking a message M containing blocks of
length b bits. An input signature is padded to the left of the message and the whole
is given as input to a hash function which gives us a temporary message digest MD’.
MD’ again is appended to an output signature and the whole is applied a hash
function again, the result is our final message digest MD
n < K+ < b
= 36 H = 0011 0110
= 5C H = 0101 1100
HMAC Structure