Zyuzin Dmitrievich Vladislav (Moscow Technical University of Communications and Informatics)
Vdovenko Dmitry Viktorovich (Moscow Technical University of Communications and Informatics)
Bolshakov Vasily Nikolaevich (Moscow Technical University of Communications and Informatics)
Busenkov Alexey Alexandrovich (Moscow Technical University of Communications and Informatics)
Krivdin Alexander Dmitrievich (Moscow Technical University of Communications and Informatics)
|
This article explores the mechanism for ensuring and verifying message integrity, such as NMAC. All that is in the MAC is the ability to share a secret key to make sure that all messages that they pass through this algorithm can be changed.
This article provides a realistic example of the use of hash functions.
Keywords:Message, hash function, hash, byte, key, size, subscriber, attacker, client, server, case, string, algorithm.
|
|
|
Read the full article …
|
Citation link: Zyuzin D. V., Vdovenko D. V., Bolshakov V. N., Busenkov A. A., Krivdin A. D. HMAC research on an example of an authorization call-answer method // Современная наука: актуальные проблемы теории и практики. Серия: Естественные и Технические Науки. -2020. -№04. -С. 81-87 DOI 10.37882/2223–2966.2020.04.17 |
|
|