...
MAC | https://www.youtube.com/watch?v=DiLPn_ldAAQ&ab_channel=IntroductiontoCryptographybyChristofPaar |
---|---|
symmetrical key ( how to exchange/distribute/change keys ) | |
1 | Arbitrary Input length |
2 | Fix output length |
3 | message authentication: because of the secure channel use - build with private/public Key |
4 | Integrity ( change inline ) |
5 | None-repudiation is not given ( the Rx can create from the message the signature with the symmetrical key) |
HMAC | Integrity and Authentication |
---|---|
2 stage Hashing ( XOR ) with 2 different key ( ipad and ... ) | https://www.youtube.com/watch?v=wlSG3pEiQdc&ab_channel=Computerphile |
Sender ( Data + pre-shared Key ) > hash>> HASH1 send: Data + Hash1 | Receiver: ( Data + preshared key) Data > hash> Hash2 Compare Hash2 wit rx Hash1 |
...