Difference between revisions of "Hash-based message authentication code (HMAC)"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
|||
Line 2: | Line 2: | ||
HMAC is used within the [[IPsec]], [[SSH]] and [[TLS]] protocols and for [[JSON Web Tokens]]. | HMAC is used within the [[IPsec]], [[SSH]] and [[TLS]] protocols and for [[JSON Web Tokens]]. | ||
+ | |||
+ | TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:10.156.0.97:45318 | ||
== Related == | == Related == |
Revision as of 12:41, 23 September 2022
wikipedia:HMAC is used to verify data integrity and authenticity of a message using a cryptographic hash function and a secret cryptographic key.
HMAC is used within the IPsec, SSH and TLS protocols and for JSON Web Tokens.
TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:10.156.0.97:45318
Related
See also
- Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: