Skip to content
/ hmac Public

HMAC - SHA256 implementation for educational purposes, not for production

Notifications You must be signed in to change notification settings

gautamk/hmac

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HMAC - SHA 256

HMAC

In cryptography, a keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and the authentication of a message. Any cryptographic hash function, such as MD5 or SHA-1, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-MD5 or HMAC-SHA1 accordingly. The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and on the size and quality of the key.

from Wikipedia

SHA 256

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the NSA.[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity

from Wikipedia

Implementation

HMAC.java

SHA256.java

About

HMAC - SHA256 implementation for educational purposes, not for production

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published