The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Figure 1: Illustration of the <strong>HMAC</strong> Construction6. IMPLEMENTATION NOTE<strong>The</strong> <strong>HMAC</strong> algorithm is specified for an arbitrary Approved cryptographic hash function,H. With minor modifications, an <strong>HMAC</strong> implementation can easily replace one hashfunction, H, with another hash function, H’.Conceptually, the intermediate results of the compression function on the B-byte blocks(K 0 ⊕ ipad) and (K 0 ⊕ opad) can be precomputed once, at the time of generation of the5