Really cool and something I didn't know ... Thanks a lot.. Tiny, little thing.. if memory does not fail me, HMAC assumes that both parties have symmetric key. One is added to the message before hashing. Security freaks like me would be interested in key exchange details.. Some algorithms may not be good enough
I appreciate your insights, Stan! We'd welcome a better understanding of your use case to look into this. Please share more details as mentioned here: go.aws/feedback. ^ES
Great overview of 3 phases of data encryption and then deep dive into one solution for date in use!
Really cool and something I didn't know ... Thanks a lot.. Tiny, little thing.. if memory does not fail me, HMAC assumes that both parties have symmetric key. One is added to the message before hashing. Security freaks like me would be interested in key exchange details.. Some algorithms may not be good enough
I appreciate your insights, Stan! We'd welcome a better understanding of your use case to look into this. Please share more details as mentioned here: go.aws/feedback. ^ES