Docjar: A Java Source and Docuemnt Enginecom.*    java.*    javax.*    org.*    all    new    plug-in

Quick Search    Search Deep

gnu.javax.crypto.mac: Javadoc index of package gnu.javax.crypto.mac.


Package Samples:

gnu.javax.crypto.mac

Classes:

UMac32: The implementation of the UMAC (Universal Message Authentication Code). The UMAC algorithms described are parameterized . This means that various low-level choices, like the endian convention and the underlying cryptographic primitive, have not been fixed. One must choose values for these parameters before the authentication tag generated by UMAC (for a given message, key, and nonce) becomes fully-defined. In this document we provide two collections of parameter settings, and have named the sets UMAC16 and UMAC32 . The parameter sets have been chosen based on experimentation and provide good performance ...
IMac: The basic visible methods of any MAC (Message Authentication Code) algorithm. A MAC provides a way to check the integrity of information transmitted over, or stored in, an unreliable medium, based on a secret key. Typically, MAC s are used between two parties, that share a common secret key, in order to validate information transmitted between them. When a MAC algorithm is based on a cryptographic hash function, it is then called to a HMAC (Hashed Message Authentication Code) --see RFC-2104 . Another type of MAC algorithms exist: UMAC or Universal Message Authentication Code , described in draft-krovetz-umac-01.txt ...
UHash32: UHASH is a keyed hash function, which takes as input a string of arbitrary length, and produces as output a string of fixed length (such as 8 bytes). The actual output length depends on the parameter UMAC-OUTPUT-LEN. UHASH has been shown to be epsilon-ASU ("Almost Strongly Universal"), where epsilon is a small (parameter-dependent) real number. Informally, saying that a keyed hash function is epsilon-ASU means that for any two distinct fixed input strings, the two outputs of the hash function with a random key "look almost like a pair of random strings". The number epsilon measures how non-random ...
TMMH16: TMMH is a universal hash function suitable for message authentication in the Wegman-Carter paradigm, as in the Stream Cipher Security Transform. It is simple, quick, and especially appropriate for Digital Signal Processors and other processors with a fast multiply operation, though a straightforward implementation requires storage equal in length to the largest message to be hashed. TMMH is a simple hash function which maps a key and a message to a hash value. There are two versions of TMMH: TMMH/16 and TMMH/32. TMMH can be used as a message authentication code, as described in Section 5 (see References). ...
HMac: The implementation of the HMAC (Keyed-Hash Message Authentication Code). HMAC can be used in combination with any iterated cryptographic hash function. HMAC also uses a secret key for calculation and verification of the message authentication values. The main goals behind this construction are To use, without modifications, available hash functions. In particular, hash functions that perform well in software, and for which code is freely and widely available. To preserve the original performance of the hash function without incurring a significant degradation. To use and handle keys in a simple ...
OMAC: The One-Key CBC MAC, OMAC. This message authentication code is based on a block cipher in CBC mode. References: Tetsu Iwata and Kaoru Kurosawa, OMAC: One-Key CBC MAC .
MacFactory: A Factory that instantiates instances of every supported Message Authentication Code algorithms, including all HMAC algorithms.
MacOutputStream: A filtering output stream that computes a MAC (message authentication code) over all data written to the stream.
MacInputStream: A filtering input stream that computes a MAC (message authentication code) over all data read from the stream.
HMacFactory: A Factory to instantiate Keyed-Hash Message Authentication Code (HMAC) algorithm instances.
BaseMac: A base abstract class to facilitate MAC (Message Authentication Code) implementations.

Home | Contact Us | Privacy Policy | Terms of Service