Blockchain Tutorial

Blockchain Tutorial History of Blockchain Blockchain Terminologies Working of Blockchain Blockchain vs DLT Blockchain Versions Smart Contracts Blockchain Applications Cryptography Role of Bitcoin Miners Blockchain Hash Function Bitcoin Basic Component Blockchain Block Hashing How to Block Hashes Work in Blockchain Blockchain Pow Coinbase Transaction Key Concepts in Bitcoin Key Areas of Blockchain Blockchain Cryptocurrency Blockchain DAO Blockchain Double Spending Blockchain Bitcoin Cash Bitcoin Forks and SegWit Blockchain Merkle Tree Difference between Blockchain and Database Bitcoin Mitigating Attacks Who sets the Bitcoin Price Getting Started with Bitcoin How to choose Bitcoin Wallet Sending and Receiving Bitcoin Converting Bitcoins to Fiat Currency Ethereum 2.0 Blockchain Data Management Steps to become a Blockchain developer Smart Contracts Advantages of Blockchain in healthcare Decentralized Voting System using Blockchain Demur-rage currencies in Blockchain How can Blockchain Technology help IoT to reach its full potential Project Ideas on Blockchain for Professionals Consensus Algorithms in Blockchain Top 10 Blockchain Project Concepts Uses of Blockchain Obtaining Free Test Ethers What does a Blockchain contain What does the IT industry mean by BaaS Top Blockchain Project Ideas for Beginners

Cryptography

Introduction and Features of Cryptography DNA cryptography ECB Mode in Cryptography Elliptic curve in cryptography Format String Vulnerabilities in Cryptography and Network Security Kerberos in Cryptography and Network Security Blowfish Algorithm in Cryptography Data Encryption Standards Feistel Cipher in Cryptography HMAC Algorithm in Cryptography IP Security in Cryptography ElGamal Algorithm ElGamal Cryptosystem What is IDEA Advantages of Cryptography Role of Bitcoin Miners Blockchain Hash Function Blockchain Merkle Tree Blockchain Pow Coinbase Transactions Consensus Algorithms in Blockchain Blockchain Technology-Introduction Blockchain - Public Key Cryptography Double Spending On Blockchain Bitcoin - Brief History Blockchain - Incentives to Miners Blockchain - Network Mining Blockchain – Resolving Conflicts Full vs Simple Payment Verification in Blockchain Characteristics of Hash Functions DSA Algorithm in Cryptography Security Services in Cryptography and Network Security Enterprise Blockchain Solution Blockchain Payment Verification Blockchain Mitigating Attacks Four Key Concepts of Blockchain Blockchain Variants Blockchain Hashing Crypto Currency in India Blockchain Privacy Blockchain Bridge Blockchain And Ledger AWS and Blockchain Blockchain - Incentives to Miners Blockchain - Network Mining What is a Blockchain Wallet? Riot Blockchain Top 10 blockchain development companies What is Block Blockchain Council? What is Monero Blockchain? Top 10 Blockchain Stocks What is a hot blockchain? What is Blockchain Transaction? What is sui blockchain? What makes Casper a modular blockchain Blockchain as a Service How to Become a Blockchain Developer in 2024? What is Avalanche's Three Blockchains? What is Block blockchain poker? Alchemist Blockchain Blockchain for Healthcare Ai and Blockchain How the cryptocurrency created? What is crypto economics? Attacks on Cryptosystems Triple DES

HMAC Algorithm in Cryptography

HMAC stands for Hash-Based Message Authentication Code. It is a type of message authentication code that is obtained by executing a cryptographic hash function that is used to be authenticated and secretly share the key. HMAC is used for authentication and data integrity, similar to other Message authentication codes (MAC). The vital function of the HMAC algorithm is to check the data integrity involved in the communication process. HMAC uses transmission protocols like SFTP, HTTPS and FTPS. The cryptographic function used in HMAC is SHA-1, MD-5 and SHA-256. The HMAC algorithm is very similar to digital signature because both use a shared key and hash function. The only difference is that HMAC uses a symmetric key, whereas digital signature uses an asymmetric key. 

History of HMAC

The process and decision depend on data integrity. If the hacker damages the data, it affects the data's function and conclusion. So we must ensure our data integrity during working over the internet. To overcome this problem, HMAC comes to the world of cryptography. 

Application of HMAC

There is various use of HMAC in the field of cryptography and network security. These are as follows.

  1. With the help of HMAC, we can verify the details while logging in or creating an account.
  2. The data is then authenticated and sent back to the browser with the help of HMAC.
  3. Due to less cost, HMAC is used in the field of the Internet of Things (IoT).
  4. When the user needs to reset their password, then with the help of HMAC, the server sends a verification link to the user.
  5. With the service of HMAC, the user can convert any data length to a fixed-length message. 

Objectives of HMAC Algorithm

  1. The main aim of HMAC is to quickly generate the output from the input text. 
  2. The HMAC algorithm is less affected by collision in comparison to the hash function.
  3. HMAC has the ability to reuse algorithms like SHA-1 and MD5 and then replace these with embedded hash functions.
  4. HMAC tries to handle the key very simply.

Working of HMAC

HMAC provides a private key, which is known to both the server and the client. The client generates a hash key for every request. There are three types of authentication functions. They are message encryption, message authentication code, and hash functions. The significant difference between MAC and hash (HMAC here) is the dependence on a key. In HMAC, we have to apply the hash function along with a key on the plain text. The hash function will be used for the primary text message. But before applying, we have to compute S bits and then append them to plain text and apply the hash function. For generating those S bits, we use a shared key between the sender and receiver. 

HMAC Algorithm

The work of the HMAC algorithm starts by taking the message M from the block of length L bits. Then the input signature is merged with the left message and the whole input gives the output of the embedded hash function. Then the entire hash function is again applied with the complete message. After this, the final note has come.

Here is the diagram for the HMAC algorithm.

HMAC Algorithm in Cryptography

Here H = hash function.

M = original message.

Si = Input signature.

So= output signature.

Yi = ith block of the message M whose length range from 1 to L.

L= number of blocks in message M.

K= secret key used for the encryption process.

IV = initial vector.

Advantages

  • HMACs are ideal for high-performance systems like routers due to the use of hash functions which are calculated and verified quickly, unlike public key systems.
  • Digital signatures are more significant than HMACs, yet the HMACs provide comparably higher security.
  • HMACs are used in administrations where vital public systems are prohibited.

Disadvantages 

  • HMACs use shared keys which may lead to non-repudiation. If either sender or receiver's key is compromised, it will be easy for attackers to create unauthorized messages.