Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Demystifying Cryptography with OpenSSL 3.0

You're reading from  Demystifying Cryptography with OpenSSL 3.0

Product type Book
Published in Oct 2022
Publisher Packt
ISBN-13 9781800560345
Pages 342 pages
Edition 1st Edition
Languages
Author (1):
Alexei Khlebnikov Alexei Khlebnikov
Profile icon Alexei Khlebnikov

Table of Contents (20) Chapters

Preface 1. Part 1: Introduction
2. Chapter 1: OpenSSL and Other SSL/TLS Libraries 3. Part 2: Symmetric Cryptography
4. Chapter 2: Symmetric Encryption and Decryption 5. Chapter 3: Message Digests 6. Chapter 4: MAC and HMAC 7. Chapter 5: Derivation of an Encryption Key from a Password 8. Part 3: Asymmetric Cryptography and Certificates
9. Chapter 6: Asymmetric Encryption and Decryption 10. Chapter 7: Digital Signatures and Their Verification 11. Chapter 8: X.509 Certificates and PKI 12. Part 4: TLS Connections and Secure Communication
13. Chapter 9: Establishing TLS Connections and Sending Data over Them 14. Chapter 10: Using X.509 Certificates in TLS 15. Chapter 11: Special Usages of TLS 16. Part 5: Running a Mini-CA
17. Chapter 12: Running a Mini-CA 18. Index 19. Other Books You May Enjoy

HMAC – a hash-based MAC

Hash-based Message Authentication Code (HMAC) is a MAC that is generated by the HMAC function.

The HMAC function uses a cryptographic hash function and a secret key. The function is not overly complex and can be understood by many non-cryptographers. It is defined as follows:

HMAC(K, message) = H(K' XOR opad ‖ H(K' XOR ipad ‖ message))

Here, the following can be understood:

  • Message: This is the message to be authenticated.
  • H: This is the hash function, for example, SHA3-256.
  • K: This is the secret key.
  • K': This is a block-sized key derived from K depending on the hash function’s internal block size, B.
  • ipad: This is the inner padding, consisting of byte 0x36, which is repeated B times.
  • opad: This is the outer padding, consisting of byte 0x5C, which is repeated B times.
  • ‖: This refers to a concatenation.

Note that K' is derived from K, as follows:

  • If...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}