Message authentication check: Difference between revisions
From Hackepedia
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 13: | Line 13: | ||
this usage makes HMAC-MD5 and HMAC-SHA1 immune to recently discovered birthday | this usage makes HMAC-MD5 and HMAC-SHA1 immune to recently discovered birthday | ||
attacks on MD5 and SHA1. | attacks on MD5 and SHA1. | ||
HMAC are defined in [[RFC]] 2104. |
Revision as of 13:12, 30 October 2005
A message authentication check, or MAC is a cryptographic check that a message is from a given origin.
Most MACs are constructed from keyed one way hash functions. The method is for the sender and receiver to agree on a symmetric key, and to then calculate:
C = hash(K_a | message)
ipsec uses the HMAC methods, which actually calculate:
C = hash('55555555', hash(K_a | message | 'uuuuuuuuu'))
this usage makes HMAC-MD5 and HMAC-SHA1 immune to recently discovered birthday attacks on MD5 and SHA1.
HMAC are defined in RFC 2104.