{"draft":"","doc_id":"RFC2104","title":" HMAC: Keyed-Hashing for Message Authentication ","authors":["H. Krawczyk","M. Bellare","R. Canetti"],"format":["ASCII","HTML"],"page_count":"11","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IP Security Protocol","abstract":" This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind ","pub_date":"January 1997","keywords":["ipsec","Message","Digest","Internet","Protocol","Security","encryption"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC6151"],"see_also":[],"doi":"10.17487\/RFC2104","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc2104"}