In: Computer Science
Briefly describe how to use a keyed hash.
Keyed hashing algorithm blend a secret key in with the message information blocks while making a hash code. There are two primary ways to deal with making keyed hash codes, otherwise called Message Authentication Codes (MACs). The first, and most regularly utilized, approach is to join the secret key and the message information together, and utilize a normal cryptographic hashing algorithm to make a hash code for the blend. The subtleties of how to consolidate the key and the message rely upon your decision of algorithm, however one generally utilized methodology is the HMAC standard. The second methodology doesn't include a hashing algorithm by any means. The message information is encrypted with a symmetrical algorithm, and everything except the last few bits of the encrypted information are disposed of what remains is utilized as the keyed hash code. Note that despite the fact that a normal cryptographic hashing algorithm isn't utilized; the convention of utilizing encryption to make a keyed hash code is as yet named a keyed hashing algorithm.