H. Krawczyk IBM M. Bellare UCSD R. Canetti IBM 1997å¹´ 2æ HMACï¼ ã¡ãã»ã¼ã¸èªè¨¼ã®ããã®éµä»ããã·ã³ã° (HMAC: Keyed-Hashing for Message Authentication) ãã®ã¡ã¢ã®ä½ç½®ä»ã ãã®ã¡ã¢ã¯ãã¤ã³ã¿ã¼ãããã»ã³ãã¥ããã£ã«å¯¾ãã¦æ å ±ãæä¾ãããã®ã§ããããã®ã¡ã¢ã¯ãä½ãã¤ã³ã¿ã¼ãããã®æ¨æºãè¦å®ãããã®ã§ã¯ãªãããã®ã¡ã¢ã®é å¸ã«å¶éã¯ãªãã è¦æ¨ ãã®ææ¸ã§ã¯ãæå·ããã·ã¥é¢æ°ã使ç¨ãã¦ã¡ãã»ã¼ã¸èªè¨¼ãè¡ãªãä»çµã¿ã§ãã HMAC ã«ã¤ãã¦è¨è¿°ãããHMAC ã¯ãMD5 ã SHA-1 ãªã©ã®å復æå·ããã·ã¥é¢æ°ãç§å¯ã®å ±æéµã¨çµã¿åããã¦ä½¿ç¨ãããHMAC ã®æå·ã¨ãã¦ã®å¼·åº¦ã¯ã使ç¨ãã¦ããããã·ã¥é¢æ°ã®ããããã£ã«ä¾åããã 1.ã¯ããã« ä¿¡é ¼ã§ããªãã¡ãã£ã¢ä¸ãä¼éããèç©ãããæ å ±ã®
{{#tags}}- {{label}}
{{/tags}}