How to calcluate the hmac value

Assignment Help Computer Engineering
Reference no: EM132109269

In this project you will implement HMAC (Keyed-hash Message Authentication Code) using SHA-512 as the building block. HMAC with key K of a input message M can be expressed as:

where is the key padded out to block size, which is 1024 bits when we use SHA-512. Here, opad, ipad are specified padding constants, which is specified as follows: ipad:00110110 (36 in hexidecimal) repeated by 1024/8=128 times; opad:01011100 (5C in hexidecimal) repeated by 1024/8=128. You do not need to implement SHA-512 yourself. For an implementation of SHA-512, you can use an existing crypto library.

Can you help me with the process (or psuedocode) of how to calcluate the HMAC value?

Reference no: EM132109269

Questions Cloud

Describe the process the algorithm is executing : View the visual presentation of your algorithm in xSortLab; Describe the process the algorithm is executing;Characterize and evaluate the algorithm in terms
Evans argued that under accord and satisfaction : Evans used his credit card to run up a $98.75 bill with the Rosen Department Store. When Rosen tried to collect, Evans wrote a check for $79.00.
Implement a program such that it simulates the process : Implement a program such that it simulates the process of repeated attempts to hit a target with a projectile.
Create a program called producer-consumer : Your program will either use unix socket (-u) or shared memory (-s) depending on user input in the command line argument .
How to calcluate the hmac value : Can you help me with the process (or psuedocode) of how to calcluate the HMAC value?
Briefly describe the actual requirements of the job : Describe the principle characteristics of these individuals or groups, particularly those characteristics that impact on their interaction with you
Explain what is a meant by the term event : Programs written for a graphical user interface have to deal with events. Explain what is a meant by the term "event".
Calculate the price at which you bought the bond : i) Calculate the price at which you bought the bond and the price at which you sell it if you sold it now
Explain each of the steps in the programming process : What do you think the outcome would be if this C# code were compiled and executed? Explain your answer.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find whether the year entered from the keyboard

create a C program to determine whether the year entered from the keyboard is a leap year. Display a message indicating whether the year is or is not a leap year.

  What is the size of the sample space

What is the probability of matching all five numbers in any order plus matching the Powerball number?

  What will cat foo foo foo display

Look up the man pages of mkdir to find out the easiest way of creating this directory structure: share/man/cat1. What will cat foo foo foo display?

  Wap to input a sequence of bytes and store them in memory

Write a program to input a sequence of bytes and store them sequentially in memory, starting at location $OO 2000.

  What is the required input needed to create a sweep

What is the required input needed to create a sweep? What is the optional input? What is the required input needed to create a loft? What is the optional input?

  Build a read-write property named validlastname

Create a read-write property named ValidLastName that stores a String value in the hidden variable mstrLastName. design the property using a Property Procedure.

  How many assembly fixtures do we need

Utilization of the sub-assembly stations and the inspection station. Which one is the bottleneck of the process - What is the production rate of auto assemblies per hour and Make a time plot of the work-in-process inventory and comment on whether th..

  Define a database can still be modified without detection

Show that if longitudinal parity is used as an error detection code, values in a database can still be modified without detection

  Design four unique systems design diagrams from your class

Design four unique systems design diagrams from your class project for peer review. Include an old design and new design using class and architecture diagrams.

  Critically evaluate why or why not given statement is valid

Critically evaluate why, or why not, the statement, ‘There are no unusual managerial issues related to the introduction of client/server systems,' is valid.

  How can you tell which way is better

How can you tell which way is better? Evaluate your Java code using both experimental studies and asymptotic analysis.

  What is the db strength of the signal at point z

At point Y, the signal is boosted by 10 dB. As the signal travels to point Z, it loses 7 dB. What is the dB strength of the signal at point Z?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd