what purpose?

HMAC is used for what purpose?

HMAC is used for what purpose?

A.
Integrity

B.
Authority

C.
Capacity

D.
Confidentiality

E.
Authentication

Explanation:
The Authentication Header (AH) protocol provides a means to verify the authenticity/integrity of the content and origin of a packet. You can authenticate the packet by the checksum calculated via a hash-based message authentication code (HMAC) using a secret key and either MD5 or SHA-1 hash functions.
Message Digest version 5 (MD5)-An algorithm that produces a 128-bit hash (also called a digital signature or message digest) from a message of arbitrary length and a 16-byte key. The resulting hash is used, like a fingerprint of the input, to verify content and source authenticity and integrity.
Secure Hash Algorithm-1 (SHA-1)-An algorithm that produces a 160-bit hash from a message of arbitrary length and a 20-byte key. It is generally regarded as more secure than MD5 because of the larger hashes it produces. Because the computational processing is done in the NetScreen ASIC, the performance cost is negligible.



Leave a Reply 0

Your email address will not be published. Required fields are marked *