Key-Hashed Message Authentication Codes or HMACS
What is Key-Hashed Message Authentication Codes or HMACS?
Expert
Digital signatures provide message-by-message authentication, as well as message integrity. Unfortunately the use of digital signatures requires that parties have a public/private key pair and that a secure mechanism for distributing public keys exists. There is also overhead for computing the digital signature, since slow public key encryption is used. Because of these shortcomings another approach to message-by-message authentication is often used - key-hashed message authentication codes. This approach requires that both parties share some secret information, usually a symmetric key. Most cryptographic systems, systems that provide authentication and confidentiality, provide this. The process involves appending the secret shared information to the message and then computing the hash, which is called the HMAC. The HMAC is sent with the message. The receiver recalculates the HMAC from the plaintext part of the message using its own copy of the shared secret information. If the calculated HMAC is equal to the received HMAC, the message is authenticated.
The advantage of using HMACs is reduced computation and not needing to maintain a public key infrastructure. However, HMACs do not provide for non-repudiation as both sides know the secret shared information and the receiver could construct a HMAC for a message that the sender did not send. Digital signatures must be used if non-repudiation is required.
Purely Competitive Market: In pure sense, there are no actual world markets which are purely competitive. There cannot be since purely competitive markets need: an infinite number of buyers; an unlimited number of sellers; each and every firm selling
Specify the types of frame fields contained within the HDLC.
Describe the function of a rendezvous point?
Explain the Non-GUI clients, GUI Clients and OOUI Clients?
Web Servers: The web pages on Internet are stored on the computers which are connected to the Internet. Such computers are termed as web servers.
Explain the term permutation.
What kinds of routes are permitted into a stub area? Answer: OSPF intra-area and inter area routes, and a default route. Exterior routes are not promoted into a stub
Clarify what are the key elements of protocols?
Your organization comprises two servers named Server1 and Server2 which run Windows Server 2003 Service Pack 2. Server1 and Server2 host similar Web sites. You require backing up the server configuration on Server1 every hour and t
Illustrate what do you mean by the term Link?
18,76,764
1948621 Asked
3,689
Active Tutors
1418533
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!