A mechanism for message authentication using cryptographic hash functions. HMAC
can be used with any iterative cryptographic hash function (for example, MD5 and
SHA-1) in combination with a secret shared key. The cryptographic strength of
HMAC depends on the properties of the underlying hash function.
No comments:
Post a Comment
suggest me about my post