Hashed message authentication code: Difference between revisions
imported>Chris Day No edit summary |
imported>Sandy Harris (link) |
||
Line 6: | Line 6: | ||
[[IPsec]] uses an HMAC for packet-level authentication. | [[IPsec]] uses an HMAC for packet-level authentication. | ||
Many applications use both a [[block cipher]] for secrecy and an HMAC for data authentication, Such a system must make two passes through the data, one to encrypt it and one to hash it. There is recent work on the design of algorithms that can do both in one pass. Many of the proposed solutions take the form of new [[Block_cipher_modes_of_operation#Dual_use_modes|modes of operation]] for block ciphers. |
Revision as of 03:49, 2 November 2008
A hashed message authentication code or HMAC is a cryptographic technique for providing data integrity protection.
HMACs use a cryptographic hash algorithm and a cryptographic key. The sender generates the HMAC from the message and the key; the receiver verifies using both.
If HMAC verification succeeds, the receiver knows not only that the message is unchanged since the hash was generated (which he would know with any hash algorithm), but also that whoever generated the HMAC knew the appropriate key. This prevents an attacker without the key from altering a message and generating a valid hash for the changed version. HMACs prevent man-in-the-middle attacks.
IPsec uses an HMAC for packet-level authentication.
Many applications use both a block cipher for secrecy and an HMAC for data authentication, Such a system must make two passes through the data, one to encrypt it and one to hash it. There is recent work on the design of algorithms that can do both in one pass. Many of the proposed solutions take the form of new modes of operation for block ciphers.