Introduction to CSE Seminar Idea on The Keyed-Hash Message Authentication Code (HMAC) :
The paper is about implementation of HMAC. This mechanism can be implemented with any approach of the cryptography with a shared secret key. The strength of the HMAC is dependent on the hash function properties.
The standard HMAC is used for applications which are required for the message authentication. The message authentication is done by using MCA. The applications of MACs which are being based on the hash functions of cryptography are named as HMAC’s.
The process of message authentication is as follows; firstly the sender of the message makes use of the HMAC function for producing the value, by considering both secret key as well as the message input. This MAC is delivered to the receiver of the message along with the message. The receiver will work on the message which is received with the key and compares then it compares the result with the MAC which is received. If a matching is found it is understood that the message was received in a correct manner.
The main aim of the implementation of MAC includes providing security i.e. providing authentication for the sender of the message and also ensuring the integrity so that additional mechanisms are not required. The functional requirements of HMAC’s includes the input as message and also has a secret key which will be exposed only for the originator of the message and also the receiver which it has to be delivered.
Even the limitations exist with this MAC layer, i.e. when we are dealing with security we cannot provide full assurance that the message passed is authentic. These limitations can exist with the non-authentic messages.