HMAC?
Perry E. Metzger
perry at piermont.com
Mon Aug 16 22:29:24 EDT 2004
So the question now arises, is HMAC using any of the broken hash
functions vulnerable?
I can't answer that myself yet since I haven't given it a good enough
think, but I'll will point people at the original HMAC paper at:
http://www.research.ibm.com/security/keyed-md5.html
The paper itself is at:
http://www.research.ibm.com/security/bck2.ps
Perry
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list