2019
DOI: 10.21817/ijet/2019/v11i4/191104086
|View full text |Cite
|
Sign up to set email alerts
|

Increasing Cryptography Security using Hash-based Message Authentication Code

Abstract: Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human societies, protecting and maintaining information is critical, and much attention should be paid to it. In the cryptography using hash-based message authentication code (HMAC), one can ensure the authenticity of a message.Using a cryptography key and a hash function, HMAC creates the message authentication code and adds it to the end of the message supposed to be sent to the recipient. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…It hashes message bits and HMAC using bit Swapp and rotation to the left in two steps. The findings reveal that the X-HMAC function can act as a strong barrier against data identification and HMAC attacks, preventing the attacker from simply identifying the blocks and exploiting HMAC flaws (Mousavi & Shakour, 2019).…”
Section: Literature Reviewmentioning
confidence: 99%
“…It hashes message bits and HMAC using bit Swapp and rotation to the left in two steps. The findings reveal that the X-HMAC function can act as a strong barrier against data identification and HMAC attacks, preventing the attacker from simply identifying the blocks and exploiting HMAC flaws (Mousavi & Shakour, 2019).…”
Section: Literature Reviewmentioning
confidence: 99%