Difference between revisions of "Hash-based message authentication code (HMAC)"
Jump to navigation
Jump to search
Line 9: | Line 9: | ||
* [[HMAC API]] from [[AWS Key Management Service]] | * [[HMAC API]] from [[AWS Key Management Service]] | ||
* [[Terraform provider: dns]]: <code>[[hmac-md5]]</code> | * [[Terraform provider: dns]]: <code>[[hmac-md5]]</code> | ||
+ | * [[OATH]] | ||
==See also== | ==See also== |
Revision as of 11:53, 15 February 2024
wikipedia:HMAC is used to verify data integrity and authenticity of a message using a cryptographic hash function and a secret cryptographic key.
HMAC is used within the IPsec, SSH and TLS protocols and for JSON Web Tokens.
TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:10.156.0.97:45318
Related
See also
- Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: