Difference between revisions of "Hash-based message authentication code (HMAC)"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
− | [[wikipedia:HMAC]] is used to verify data integrity and authenticity of a message. | + | [[wikipedia:HMAC]] is used to verify data integrity and authenticity of a message using a cryptographic hash function and a secret cryptographic key. |
+ | |||
+ | HMAC is used within the [[IPsec]], [[SSH]] and [[TLS]] protocols and for [[JSON Web Tokens]]. | ||
== Related == | == Related == |
Revision as of 11:13, 14 January 2022
wikipedia:HMAC is used to verify data integrity and authenticity of a message using a cryptographic hash function and a secret cryptographic key.
HMAC is used within the IPsec, SSH and TLS protocols and for JSON Web Tokens.
Related
See also
- Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: