Logo free mcse ccna rhce linux java learning free mcse ccna rhce linux java learning
          Sharefacebook twitter google+ google bookmark yahoo bookmark delicious digg linkedin pinterest reddit stumbleupon evernote diigo blinklist blogmarks livejournal email feed


What is HMAC (Hashed Message Authentication Code)

External Resources

We had learned about Hash Values and important Hash Value Algorithms in previous lessons. We also learned how Hash Values can be used to determin Data integrity. Unfortunately, Hash values in its original form are not capable to protect the integrity of data. If an attacker alter the Data and the Hash Value together in transmission, it will become impossible to detect the Data is tampered. A simple hash value, in its original form is not enough to protect a message from tampering.

Hashed Message Authentication Code (HMAC) is a hash function created using a Shared Secret key. Since HMAC is created using Shared Secret (which is only available to IPSec peers), a hacker cannot alter the Data and create new HMAC hash in-between the transmission. Hashed Message Authentication Code (HMAC) can be used to verify the integrity and authenticity of Data transmissions.

IPSec uses Hashed Message Authentication Code (HMAC) to protect the Hash values. RFC 4868 defines various HMAC functions related with IPSec.


              Jajish Thomason Google+
Related Topics
Seven Layers of OSI Model. Comparison between TCP/IP and OSI TCP/IP Encapsulation and Decapsulation
comments powered by Disqus

eXTReMe Tracker