09.07.2015 Views

The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...

The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...

The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 1: Illustration of the <strong>HMAC</strong> Construction6. IMPLEMENTATION NOTE<strong>The</strong> <strong>HMAC</strong> algorithm is specified for an arbitrary Approved cryptographic hash function,H. With minor modifications, an <strong>HMAC</strong> implementation can easily replace one hashfunction, H, with another hash function, H’.Conceptually, the intermediate results of the compression function on the B-byte blocks(K 0 ⊕ ipad) and (K 0 ⊕ opad) can be precomputed once, at the time of generation of the5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!