HMAC and MAC Explained: How To Build Secure Authentication With JWTsby@wagslane
4,111 reads

HMAC and MAC Explained: How To Build Secure Authentication With JWTs

May 11th 2020
3 min
by @wagslane 4,111 reads
tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

HMACs and MACs are authentication codes that allow receivers of messages to know who the sender was (authentication) A JWT (when using HMAC as the signing scheme) is basically just an HMAC message where the message data is a JWT object. An HMAC uses two rounds of hashing instead of one (or none) Each round of hashing uses a section of the secret key. We call this a length extension attack. No known extension attacks are known against the current HMAC specification.

Company Mentioned

Mention Thumbnail
featured image - HMAC and MAC Explained: How To Build Secure Authentication With JWTs
Lane Wagner HackerNoon profile picture

@wagslane

Lane Wagner

About @wagslane
LEARN MORE ABOUT @WAGSLANE'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa