Cryptography: Difference between revisions
No edit summary |
|||
Line 11: | Line 11: | ||
A HMAC can be [[Openssl_Operations#Generate_a_HMAC|generated on command-line with OpenSSL]]. | A HMAC can be [[Openssl_Operations#Generate_a_HMAC|generated on command-line with OpenSSL]]. | ||
=Message Digest= | =<span id='Cryptographic_Hash_Function'></span><span id='Message_Digest'></span>Message Digest, Cryptographic Hash Function= | ||
{{External|https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/CryptoSpec.html#MessageDigest}} | {{External|https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/CryptoSpec.html#MessageDigest}} | ||
Line 22: | Line 22: | ||
* The digest should not reveal anything about the input that was used to generate it. | * The digest should not reveal anything about the input that was used to generate it. | ||
= | == | ||
==MD5== | ==MD5== |
Revision as of 07:46, 6 May 2018
Subjects
HMAC
HMAC (hash-based message authentication code) is a message authentication code that involves a cryptographic has function and a secret cryptographic key. It may used to simultaneously verify both the data integrity and the authentication of a message. Any cryptographic has function, such as MD5 or SHA-1, may be used in calculation of the HMAC.
A HMAC can be generated on command-line with OpenSSL.
Message Digest, Cryptographic Hash Function
A cryptographically secure message digest takes arbitrary-sized input (a byte array), and generates a fixed-size output, called a digest or hash. Message digests are used to produce unique and reliable identifiers of data. They are sometimes called "checksums" or the "digital fingerprints" of the data. Changes to just one bit of the message should produce a different digest value.
A digest has two properties:
- It should be computationally infeasible to find to messages that hash to the same value.
- The digest should not reveal anything about the input that was used to generate it.
==