Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human societies, protecting and maintaining information is critical, and much attention should be paid to it. In the cryptography using hash-based message authentication code (HMAC), one can ensure the authenticity of a message.Using a cryptography key and a hash function, HMAC creates the message authentication code and adds it to the end of the message supposed to be sent to the recipient. If the recipient of the message code is the same as message authentication code, the packet will be confirmed. The study introduced a complementary function called X-HMAC by examining HMAC structure. This function uses two cryptography keys derived from the dedicated cryptography key of each packet and the dedicated cryptography key of each packet derived from the main X-HMAC cryptography key. In two phases, it hashes message bits and HMAC using bit Swapp and rotation to left. The results show that X-HMAC function can be a strong barrier against data identification and HMAC against the attacker, so that it cannot attack it easily by identifying the blocks and using HMAC weakness.
The study dealt with efficiency and extensive use of the Hash-based Message Authentication Code (HMAC) function in well-known protocols like IP-Sec and SSL and its use in identifying the authenticity of the message using the studies conducted. With the spread of using HMAC, the security of this algorithm becomes important and can greatly help cryptographic community. In cryptography using HMAC, one can ensure the authenticity and validity of a message. HMAC creates the MAC of the message in question using a cryptographic key and a hash functions and adds it to the message intended to be sent to the receiver. The packet is verified if the message authenticity code is identical to the message on the receiver's side. Nowadays, HMAC is widely used in popular security protocols like Ip-Sec, Transport Layer Security (TLS), and Secure Sockets Layer (SSL). The ever-increasing growth and expansion of computer networks, especially the Internet, has made drastic changes in the way of life and work of individuals, organizations and institutions. Thus, information security is one of the most important issues in this cycle. By connecting the organization's internal network to the global network, organization data are exposed to the access of individuals and external hosts. Ensuring the non-access of unauthorized people to sensitive information is of the critical security challenges regarding the distribution of information on the Internet. Many solutions have been proposed, such as limited Internet use, data cryptography, and the use of security tools for internal hosts and internal network security. One of the commonest ways to protect information is to encrypt it. Cryptography means converting information into an incomprehensible form and transporting it, and then returning the ciphered data to the original and readable mode. Access to encrypted information is not possible for unauthorized people, and only those who have a password key can open the password and use the information. Cryptography of computer information is based on the cryptographic science. The use of cryptography has a long historic past. Prior to the information age, most users of information cryptography were governments, and especially military users. The history of encrypting information dates back to the Roman Empire's time. Nowadays, most computer cryptographic methods and models are used in conjunction with computers. The discovery and detection of information normally stored on a computer without any scientific method of cryptography would be easy needless of specialized expertise. Thus, data cryptography has evolved given the recent developments and new algorithms. The equivalent of cryptography in English is the word "Cryptography," which is derived from the Greek words "kryptos" meaning "confidential" and "writing." Cryptography is the science that explores the principles and methods of transportation or storing information securely (even if the data transportation path and communication channels or data storage area are insecure) [1].Literature r...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.