First page Back Continue Last page Graphics
HMAC
Effort to develop a MAC derived from a cryptographic hash code
Executes faster in software
No export restrictions
Relies on a secret key
RFC 2104 list design objectives
Used in Ipsec
Simultaneously verify integrity and authenticity