Keyed Hash Algorithm: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
Algorithm that creates a hash based on both a message and a secret key; also known as a hash message authentication code algorithm.
Source: NIST SP 800-77 | Category: