Key-Hashed Message Authentication Codes or HMACS
What is Key-Hashed Message Authentication Codes or HMACS?
Expert
Digital signatures provide message-by-message authentication, as well as message integrity. Unfortunately the use of digital signatures requires that parties have a public/private key pair and that a secure mechanism for distributing public keys exists. There is also overhead for computing the digital signature, since slow public key encryption is used. Because of these shortcomings another approach to message-by-message authentication is often used - key-hashed message authentication codes. This approach requires that both parties share some secret information, usually a symmetric key. Most cryptographic systems, systems that provide authentication and confidentiality, provide this. The process involves appending the secret shared information to the message and then computing the hash, which is called the HMAC. The HMAC is sent with the message. The receiver recalculates the HMAC from the plaintext part of the message using its own copy of the shared secret information. If the calculated HMAC is equal to the received HMAC, the message is authenticated.
The advantage of using HMACs is reduced computation and not needing to maintain a public key infrastructure. However, HMACs do not provide for non-repudiation as both sides know the secret shared information and the receiver could construct a HMAC for a message that the sender did not send. Digital signatures must be used if non-repudiation is required.
What do you meant by the GPRS Core Network?
Networking control unit: This is a field panel housing electronic modules, terminal blocks, and signal conditioners (pneumatic, line voltage and electronic) all within a single enclosure.The NCU have the user-programmable main processor&md
Uplink: This is the technical term for data transmission in the direction from subscriber to the network. Or instead, back to the provider or Internet provider. This is termed as back channel. The opposite transmission direction, or the 'transmission
Pros and Cons of AON Method: Advantages of AON: No dummy activities are used. Events not used, just activities. AON easy to draw when dependencies and re
Tunneling: Tunneling is a method given to transfer data securely among two networks. The data is divided into smaller packets and passed via the tunnel. The data passing via the tunnel has 3 layers of encryption. The data is encapsulated. Tunneling ca
Explain what is the Scope of Python?
Specify the types of frame fields contained within the HDLC.
Give a brief explanation of the Apple MobileMe Calendar.
What is meant by the flow control?
Define Open Source Software in brief?
18,76,764
1952958 Asked
3,689
Active Tutors
1434738
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!