Keyed-MD5 for Message Authentication
draft-krawczyk-keyed-md5-01
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Author | Dr. Hugo Krawczyk | ||
| Last updated | 1995-11-22 | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-krawczyk-keyed-md5-01.txt
Abstract
This document describes a keyed-MD5 mechanism for use as a message authentication code (MAC) (or, integrity check value -- ICV). It is mainly intended for integrity verification of information transmitted over open networks (e.g., Internet) between parties that share a common secret key. The proposed mechanism combines the (key-less) MD5 hash function [RFC-1321] with a shared secret key. The description of keyed-MD5 in this document is independent of its use in any particular protocol. An analogous mechanism can be used in combination with other iterative hash functions, e.g., SHA.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)