SECURITY
Authenticated Encryption and how not to get caught chasing a coyote
I introduced HMAC (Hash-based Message Authentication Code) through the back door when talking about the Time-based One Time Password (TOTP) of Dropbox’s two-step verification. But TOTP is actually a peculiar way to use HMAC. Let’s explore what Message Authentication Codes (MACs) are normally used for and why they play such an important role in the …
Continue reading