ASecuritySite Podcast

CMAC or HMAC?


Listen Later

In cybersecurity, there are so many acronyms, and to be an expert, you really need to dig underneath the methods and understand how they work. One weak area of the industry is in the usage of MACs (Message Authentication Codes).

With the public-key signing, we use a public key and a private key, where the private key will digitally sign a hash of the message, and where the public key is verified the signature. With a MAC, we use a shared symmetric key, and where Bob and Alice will share the same secret key (Figure 1).

 

https://medium.com/@billatnapier/cmac-or-hmac-which-is-better-8e1861f744d0 

...more
View all episodesView all episodes
Download on the App Store

ASecuritySite PodcastBy Professor Bill Buchanan OBE


More shows like ASecuritySite Podcast

View all
Risky Business by Patrick Gray

Risky Business

361 Listeners

Zero Knowledge by Zero Knowledge Podcast

Zero Knowledge

94 Listeners

Root Causes: A PKI and Security Podcast by Tim Callan and Jason Soroko

Root Causes: A PKI and Security Podcast

15 Listeners

Security Cryptography Whatever by Deirdre Connolly, Thomas Ptacek, David Adrian

Security Cryptography Whatever

77 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners

Oxide and Friends by Oxide Computer Company

Oxide and Friends

47 Listeners