Difference between revisions of "Hash-based message authentication code (HMAC)"
Jump to navigation
Jump to search
Line 11: | Line 11: | ||
* [[OATH]] | * [[OATH]] | ||
− | ==See also== | + | == See also == |
* {{Hash}} | * {{Hash}} | ||
− | * {{ | + | * {{Authentication}} |
[[Category:Security]] | [[Category:Security]] |
Revision as of 11:54, 15 February 2024
wikipedia:HMAC is used to verify data integrity and authenticity of a message using a cryptographic hash function and a secret cryptographic key.
HMAC is used within the IPsec, SSH and TLS protocols and for JSON Web Tokens.
TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:10.156.0.97:45318
Related
See also
- Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
- Authentication, AAA, MFA, OpenID, OAuth, OATH, PAM, Personal access token, CWE: Broken Access Control, PAT, Mutual authentication, Federated authentication, IdP, Amazon Cognito, Phone to sign in, Firebase Authentication, Auth0, WebAuthn, Web3auth, Challenge-response, Passwordless authentication, HMAC, HOTP, TOTP, OATH
Advertising: