Keyed-hashing message authentication
messaging, cryptography
(HMAC) A mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
[RFC 2104].
(1997-05-10)
Read Also:
- Keyed sequenced data set
database (KSDS) One of the access methods used by VSAM. KSDS has indexes and data split into CI (Control Interval) in CA (Control Area) and multi index levelled. Forward and backward compression is applied to key values. (1999-01-11)
- Key escrow
security A controversial arrangement where the keys needed to decrypt encrypted data must be held in escrow by a third party so that government agencies can obtain them to decrypt messages which they suspect to be relevant to national security. (1999-12-14)
- Keyes-technique
[kahyz] /kaɪz/ noun 1. a system of treating periodontal diseases by eliminating specific disease-related microorganisms, primarily through nonsurgical therapy that is regulated and adjusted in accordance with microscopic or cultural findings in subgingival plaque specimens.
- Key field
database A field of a database (typically a relational database) table which together form a unique identifier for a record (a table entry). The aggregate of these fields is usually referred to simply as “the key”. (1997-08-03)
- Key frame
graphics A frame in an animated sequence of frames which was drawn or otherwise constructed directly by the user rather than generated automatically, e.g. by tweening. (1995-04-06)