HMAC: Keyed-Hashing for Message Authentication, February 1997
- File formats:
- Updated by:
- RFC 6151
- H. Krawczyk
- ipsec (sec)
Cite this RFC: TXT | XML | BibTeX
Discuss this RFC: Send questions or comments to the mailing list email@example.com
Other actions: View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 2104
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.