ASecuritySite Podcast

CMAC or HMAC?


Listen Later

In cybersecurity, there are so many acronyms, and to be an expert, you really need to dig underneath the methods and understand how they work. One weak area of the industry is in the usage of MACs (Message Authentication Codes).

With the public-key signing, we use a public key and a private key, where the private key will digitally sign a hash of the message, and where the public key is verified the signature. With a MAC, we use a shared symmetric key, and where Bob and Alice will share the same secret key (Figure 1).

https://medium.com/@billatnapier/cmac-or-hmac-which-is-better-8e1861f744d0

...more
View all episodesView all episodes
Download on the App Store

ASecuritySite PodcastBy Professor Bill Buchanan OBE

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

2 ratings


More shows like ASecuritySite Podcast

View all
Risky Business by Risky Business Media

Risky Business

371 Listeners

The Quanta Podcast by Quanta Magazine

The Quanta Podcast

544 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,077 Listeners

Risky Bulletin by Risky Business Media

Risky Bulletin

45 Listeners

The Rest Is Classified by Goalhanger

The Rest Is Classified

1,153 Listeners