1998
DOI: 10.17487/rfc2403
|View full text |Cite
|
Sign up to set email alerts
|

The Use of HMAC-MD5-96 within ESP and AH

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

1998
1998
2012
2012

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(23 citation statements)
references
References 2 publications
0
23
0
Order By: Relevance
“…For example, HMAC-MD5 specified in RFC 2085 (Oehler and Glenn, 1997) recommends the support of long key lengths. However, in RFC 2403 (Madson and Glenn, 1998a), RFC 2404 (Madson and Glenn, 1998b), and RFC 2857 (Keromytis and Provos, 2000), the key size is restricted to 128 bits for HMAC-MD5 and 160 bits for each of HMAC-SHA-1 and HMAC-RIPEMD-160. Therefore, we implemented another version of the HMAC unit using a key size of 160 bits.…”
Section: Hmac Implementation For Fixed Key Sizementioning
confidence: 99%
See 1 more Smart Citation
“…For example, HMAC-MD5 specified in RFC 2085 (Oehler and Glenn, 1997) recommends the support of long key lengths. However, in RFC 2403 (Madson and Glenn, 1998a), RFC 2404 (Madson and Glenn, 1998b), and RFC 2857 (Keromytis and Provos, 2000), the key size is restricted to 128 bits for HMAC-MD5 and 160 bits for each of HMAC-SHA-1 and HMAC-RIPEMD-160. Therefore, we implemented another version of the HMAC unit using a key size of 160 bits.…”
Section: Hmac Implementation For Fixed Key Sizementioning
confidence: 99%
“…There exists a number of standardized authentication algorithms using HMAC. The most popular ones are HMAC-MD5 (Madson and Glenn, 1998a), HMAC-SHA-1 (Madson and Glenn, 1998b), and HMAC-RIPEMD-160 (Keromytis and Provos, 2000).…”
Section: Introductionmentioning
confidence: 99%
“…We included the hash chain functionalities for hop-count verification in the RREQ, RREP message handling modules. The MD5 [26] was used as the hash function. For the purpose of protecting routing messages with digital signatures, we ported part of the code from the ARAN (Authenticated Routing for Ad-Hoc Networks) implementation [31].…”
Section: Software Infrastructurementioning
confidence: 99%
“…The algorithm for SADB_AALG_MD5_HMAC is defined in [MG98a]. The algorithm for SADB_AALG_SHA1HMAC is defined in [MG98b].…”
Section: Algorithm Typesmentioning
confidence: 99%