Keyed-hashing message authentication


messaging, cryptography
(HMAC) A mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
[RFC 2104].
(1997-05-10)

Read Also:

  • Keyed sequenced data set

    database (KSDS) One of the access methods used by VSAM. KSDS has indexes and data split into CI (Control Interval) in CA (Control Area) and multi index levelled. Forward and backward compression is applied to key values. (1999-01-11)

  • Key escrow

    security A controversial arrangement where the keys needed to decrypt encrypted data must be held in escrow by a third party so that government agencies can obtain them to decrypt messages which they suspect to be relevant to national security. (1999-12-14)

  • Keyes-technique

    [kahyz] /kaɪz/ noun 1. a system of treating periodontal diseases by eliminating specific disease-related microorganisms, primarily through nonsurgical therapy that is regulated and adjusted in accordance with microscopic or cultural findings in subgingival plaque specimens.

  • Key field

    database A field of a database (typically a relational database) table which together form a unique identifier for a record (a table entry). The aggregate of these fields is usually referred to simply as “the key”. (1997-08-03)

  • Key frame

    graphics A frame in an animated sequence of frames which was drawn or otherwise constructed directly by the user rather than generated automatically, e.g. by tweening. (1995-04-06)


Disclaimer: Keyed-hashing message authentication definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.