04-16-2015 08:29 PM
04-17-2015 12:12 AM
Oh boy, where do we start.
In general if you have cleartext and a hash (MD5/SHA), yes an attacker could send his own clear text and generate a hash provided they deduced what kind of hashing is it.
(Looking at IPsec) we're using HMAC not "simple" hashing.
https://en.wikipedia.org/wiki/Hash-based_message_authentication_code
https://en.wikipedia.org/wiki/Cryptographic_hash_function
So the key in practice, if I may simplify it, is to mix into hashing material that the two parties know about.
04-17-2015 02:12 AM
Hi Marcin Latosiewicz's,
Your comment is not visible. why?
Regards,
AC
04-17-2015 02:56 AM
Thanks for your info .... :)
can you explain how HMAC works in IPSec? i know HMAC attaches secret key to HASH. But whats that secret key? and how it is created? and how it passes to another peer (responder)?
Thanks
AC
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide