Skip to Content
.NET Framework Security
book

.NET Framework Security

by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
April 2002
Intermediate to advanced
816 pages
20h 56m
English
Addison-Wesley Professional
Content preview from .NET Framework Security

Using Keyed Hash Functions

Keyed hash functions are a subset of cryptographic hash functions that provide data authentication services in addition to integrity protection. As their name implies, keyed hash functions work by mixing a shared secret key with the to-be-hashed message to generate a hash value. That is, the hash value h = f(M, k), where f() is the keyed hash function, M is the to-be-hashed message (of arbitrary length), and k is the secret key. Changing either the message or the secret key will change the computed hash value.

Keyed hash functions are represented in the .NET Framework as subclasses of the KeyedHashAlgorithm abstract class, which itself is a subclass of HashAlgorithm. Because every KeyedHashAlgorithm is a HashAlgorithm ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Programming .NET Security

Programming .NET Security

Adam Freeman, Allen Jones
Pro C# 7: With .NET and .NET Core

Pro C# 7: With .NET and .NET Core

Andrew Troelsen, Philip Japikse
.Net Framework Essentials

.Net Framework Essentials

Thuan L. Thai, Hoang Lam

Publisher Resources

ISBN: 067232184XPurchase book