MAC vs HMAC
Across
- 2. HMAC employs a hash function like SHA-256 or SHA-3
- 4. The block used after XORing the key with ipad in HMAC
- 6. If the cipher is weak, MAC becomes vulnerable
- 7. key block ciphers are used in MAC
- 9. MAC stands for Message Authentication Code
Down
- 1. Both MAC and HMAC are used for message authentication
- 3. HMAC protects against extension attacks
- 4. Another name for opad block in HMAC
- 5. HMAC provides stronger defense against collision attacks
- 8. HMACs are defined in this type of document – Request for Comments