For that better check wiki. Its constants by design. en.wikipedia.org/wiki/HMAC opad is the block-sized outer padding, consisting of repeated bytes valued 0x5c (01011100) ipad is the block-sized inner padding, consisting of repeated bytes valued 0x36 (00110110) As you can see from bits they try to achieve natural entropy. Just 2 keys could be zeroes and could make weaker mixing
That's my own point of view: 1) Padding Msg with b bits 2) S1 = Xor key with ipad constand value = b bits, if needed add zeros for a perfect padding 3) S = concat(2, 1) 4) S = Hash(S) = n bits (if Hash is sha512 then S is 512 bits) 5) S = Hash(append(S1, S) 6) Pad b bits the S from 5 7) Key xor with opad(constand) = b bits 8) S = concat(7, 6) 9) S = Hash(S) = n bits 10) HMac(K, S) = n bits i don't give a fuck but if am wrong pm
This was a very confusing explanation, on top of that, his accent made it worse. Sorry, but people with heavy accents like Arabic or Indian or whatever language with a thick accent, should not be doing videos like this,
Lol, what an ignorant thing to say! The explanation was clear. Matter of fact, really clear. You just have to have had an idea of HMAC before watching it.
@@crossugo5738 dude this message was 3 years ago.. are you trying to bump your video? Three years ago i was studying for my comptia certifications and was looking everywhere for understanding. Understand your audience and know that people like me will be turning to videos like yours. Whats ignorant is what you just said because i was trying to get an understanding watching your video which failed.
b4 i watch this video, I thought I know a little about hash authentication. After I watch it, I was like ????
All geniuses are laconic. Thank you bro for not wasting my time and on fingers explain HMAC
how does verification work?
no description of picture properly even. bad it is.
why use ipad and opad instead of just 2 keys ?
For that better check wiki. Its constants by design.
en.wikipedia.org/wiki/HMAC
opad is the block-sized outer padding, consisting of repeated bytes valued 0x5c (01011100)
ipad is the block-sized inner padding, consisting of repeated bytes valued 0x36 (00110110)
As you can see from bits they try to achieve natural entropy.
Just 2 keys could be zeroes and could make weaker mixing
Cool explaination.
That's my own point of view:
1) Padding Msg with b bits
2) S1 = Xor key with ipad constand value = b bits, if needed add zeros for a perfect padding
3) S = concat(2, 1)
4) S = Hash(S) = n bits (if Hash is sha512 then S is 512 bits)
5) S = Hash(append(S1, S)
6) Pad b bits the S from 5
7) Key xor with opad(constand) = b bits
8) S = concat(7, 6)
9) S = Hash(S) = n bits
10) HMac(K, S) = n bits
i don't give a fuck but if am wrong pm
please what is Si
I think it should be S1
Si is the input signature, while So is the output signature.
Thanks, but what is Iv
Initial Value
short and simple
Small mistake there the RFC is 2104
👍👍👍👍👍
made it more confusing
This was a very confusing explanation, on top of that, his accent made it worse. Sorry, but people with heavy accents like Arabic or Indian or whatever language with a thick accent, should not be doing videos like this,
The dude's accent ain't Indian or Arabic nor is it as thick as some Texan accents I've heard. Btw, there are subs. :/
Lol, what an ignorant thing to say! The explanation was clear. Matter of fact, really clear. You just have to have had an idea of HMAC before watching it.
@@crossugo5738 dude this message was 3 years ago.. are you trying to bump your video? Three years ago i was studying for my comptia certifications and was looking everywhere for understanding. Understand your audience and know that people like me will be turning to videos like yours. Whats ignorant is what you just said because i was trying to get an understanding watching your video which failed.
@@Treiyou Shut the hell up, man! I have no connection to the video. Just called you out for being an a-hole.