GlyphSignal
HMAC

HMAC

Computer communications authentication algorithm

2 min read

Why this is trending

Interest in “HMAC” spiked on Wikipedia on 2026-02-26.

Categorised under Technology, this article fits a familiar pattern. wt.cat.technology.2

By monitoring millions of daily Wikipedia page views, GlyphSignal helps you spot cultural moments as they happen and understand the stories behind the numbers.

2026-01-28Peak: 1,7802026-02-26
30-day total: 35,691

Key Takeaways

  • In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code ) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.
  • An HMAC is a type of keyed hash function that can also be used in a key derivation scheme or a key stretching scheme.
  • It trades off the need for a complex public key infrastructure by delegating the key exchange to the communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication.
  • HMAC-SHA256 or HMAC-SHA3-512).
  • HMAC uses two passes of hash computation.

In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and authenticity of a message. An HMAC is a type of keyed hash function that can also be used in a key derivation scheme or a key stretching scheme.

HMAC can provide authentication using a shared secret instead of using digital signatures with asymmetric cryptography. It trades off the need for a complex public key infrastructure by delegating the key exchange to the communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication.

Details

Any cryptographic hash function, such as SHA-2 or SHA-3, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-x, where x is the hash function used (e.g. HMAC-SHA256 or HMAC-SHA3-512). The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key.

HMAC uses two passes of hash computation. Before either pass, the secret key is used to derive two keys – inner and outer. Next, the first pass of the hash algorithm produces an internal hash derived from the message and the inner key. The second pass produces the final HMAC code derived from the inner hash result and the outer key. Thus the algorithm provides better immunity against length extension attacks.

Read full article on Wikipedia →

Content sourced from Wikipedia under CC BY-SA 4.0

Share

Keep Reading

2026-02-26
3
.xxx is a sponsored top-level domain (sTLD) intended as a voluntary option for pornographic sites on…
345,657 views
5
Rashmika Mandanna is an Indian actress who primarily works in Telugu and Hindi films. Her accolades …
237,118 views
6
Deverakonda Vijay Sai, widely known as Vijay Deverakonda, is an Indian actor and film producer who w…
209,407 views
7
Scream 7 is an upcoming American slasher film directed by Kevin Williamson from a screenplay he co-w…
168,828 views
8
The Soham murders were a double child murder committed in Soham, Cambridgeshire, England, on 4 Augus…
161,204 views
9
Jeffrey Edward Epstein was an American financier and child sex offender. He began his career as a ma…
147,859 views
Continue reading: