MAC vs HMAC

123456789
Across
  1. 2. HMAC employs a hash function like SHA-256 or SHA-3
  2. 4. The block used after XORing the key with ipad in HMAC
  3. 6. If the cipher is weak, MAC becomes vulnerable
  4. 7. key block ciphers are used in MAC
  5. 9. MAC stands for Message Authentication Code
Down
  1. 1. Both MAC and HMAC are used for message authentication
  2. 3. HMAC protects against extension attacks
  3. 4. Another name for opad block in HMAC
  4. 5. HMAC provides stronger defense against collision attacks
  5. 8. HMACs are defined in this type of document – Request for Comments