The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
The Keyed-Hash Message Authentication Code (HMAC) (FIPS-198 ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Federal Information Processing Standards Publication <strong>198</strong>2002 March 6Specifications for<strong>The</strong> <strong>Keyed</strong>-<strong>Hash</strong> <strong>Message</strong> <strong>Authentication</strong> <strong>Code</strong>TABLE OF CONTENTS1. INTRODUCTION........................................................................................................ 12. GLOSSARY OF TERMS AND ACRONYMS........................................................... 12.1 Glossary of Terms ................................................................................................. 12.2 Acronyms............................................................................................................... 22.3 <strong>HMAC</strong> Parameters and Symbols........................................................................... 23. CRYPTOGRAPHIC KEYS......................................................................................... 34. TRUNCATED OUTPUT............................................................................................. 35. <strong>HMAC</strong> SPECIFICATION ........................................................................................... 46. IMPLEMENTATION NOTE ...................................................................................... 5APPENDIX A: <strong>HMAC</strong> EXAMPLES................................................................................. 7APPENDIX B: A LIMITATION OF MAC ALGORITHMS .......................................... 12APPENDIX C: REFERENCES........................................................................................ 13vii