OnlineWoerterBuecher.de
Internes

Lexikon


Keyed-Hashing Message Authentication


(HMAC) A mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. [RFC 2104]. (1997-05-10)

In addition suitable contents:
[ 2 ] [ = ] [ ag ] [ am ] [ an ] [ ar ] [ arc ] [ as ] [ ash ] [ at ] [ au ] [ authentication ] [ b ] [ be ] [ bi ] [ C ] [ ca ] [ cat ] [ ch ] [ co ] [ com ] [ combination ] [ cr ] [ crypt ] [ cryptography ] [ D ] [ de ] [ du ] [ ec ] [ ed ] [ er ] [ era ] [ es ] [ et ] [ FC ] [ fi ] [ file ] [ fo ] [ for ] [ function ] [ ge ] [ gi ] [ gr ] [ graph ] [ gt ] [ h ] [ hash ] [ hash function ] [ HMA ] [ HMAC ] [ hr ] [ id ] [ ie ] [ il ] [ in ] [ io ] [ is ] [ it ] [ ke ] [ key ] [ Lex ] [ ly ] [ M ] [ MAC ] [ MD ] [ MD5 ] [ message ] [ mo ] [ mod ] [ module ] [ na ] [ nc ] [ ng ] [ ni ] [ ns ] [ om ] [ op ] [ pe ] [ ph ] [ pr ] [ pt ] [ query ] [ rc ] [ re ] [ RFC ] [ rl ] [ ro ] [ S ] [ sa ] [ se ] [ sh ] [ SHA ] [ shar ] [ si ] [ sm ] [ st ] [ T ] [ th ] [ to ] [ tr ] [ us ] [ ve ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (3562 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.1841 Seconds, with 17 Database-Queries
Zurück zur Startseite