Felix Olowononi

75%
Flag icon
Two popular hashing algorithms used to verify integrity are MD5 and SHA. HMAC verifies both the integrity and authenticity of a message with the use of a shared secret. Other protocols such as IPsec and TLS use HMAC-MD5 and HMAC-SHA1.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview