AI3
Home
About
Help
Contact
by Javantea
—
Oct 2, 2012
Page "Hash-based message authentication code" Paragraph 52
from
Wikipedia
«
»
The cryptographic strength of the HMAC depends upon the size of the secret key that is used.
The most common attack against HMACs is brute force to uncover the secret key.
HMACs are substantially less affected by collisions than their underlying hashing algorithms alone.
Page 1 of 1.
2.117 seconds.
Home
Help
About
Contact
Random Words
Popular Words
Popular Sentences
All Sentences
Most text is available under the
Creative Commons Attribution-ShareAlike License
; additional terms may apply.