Skip to Content

Notice

Announcing a Draft Federal Information Processing Standard for the Keyed-Hash Message Authentication Code (HMAC), and Request for Comments

Document Details

Information about this document as published in the Federal Register.

Published Document

This document has been published in the Federal Register. Use the PDF linked in the document sidebar for the official electronic format.

Start Preamble

AGENCY:

National Institute of Standards and Technology (NIST), Commerce.

ACTION:

Notice; Request for Comments.

SUMMARY:

This notice announces a draft Federal Information Processing Standard (FIPS) for the Keyed-Hash Message Authentication Code (HMAC), for public review and comment.

This draft FIPS describes a keyed-hash message authentication code (HMAC), A MECHANISM FOR MESSAGE AUTHENTICATION USING CRYPTOGRAPHIC HASH FUNCTIONS, HMAC can be used with any FIPS-approved cryptographic hash function, in combination with a shared secrete key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this draft FIPS is a generalization of HMAC as specified in Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.

Prior to the submission of this proposed standard to the Secretary of Commerce for review and approval, it is essential that consideration is given to Start Printed Page 1089the needs and views of the public, users, the information technology industry, and Federal, State and local government organizations. The purpose of this notice is to solicit such views.

DATES:

Comments must be received on or before April 5, 2001.

ADDRESSES:

Written comments may be sent to: Chief, Computer Security Division, Information Technology Laboratory, Attention: Comments on the draft FIPS for HMAC, 100 Bureau Drive—Stop 8930 National Institute of Standards and Technology, Gaithersburg, MD 20899-8930.

Electronic comments may also be sent to: “HMAC@nist.gov”.

This draft FIPS is available electronically at: http://www.nist.gov/​hmac/​ or http://csrc.nist.gov/​publications/​drafts.html.

Comments received in response to this notice will be published electronically at http://www.nist.gov/​hmac/​.

Start Further Info

FOR FURTHER INFORMATION CONTACT:

Elaine Barker, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930, telephone (301) 975-2911, email: elaine.barker@nist.gov.

End Further Info End Preamble Start Supplemental Information

SUPPLEMENTARY INFORMATION:

This draft FIPS for The Keyed-Hash Message Authentication Code (HMAC) specifies an algorithm for applications requiring message authentication. Message authentication is achieved via the construction of a message authentication code (MAC). MACs based on cryptographic hash functions are known as HMACs.

The purpose of a MAC is to authenticate both the source of a message and its integrity without the use of any additional mechanisms. HMACs have two functionally distinct parameters, message input and a secret key known only to the message originator and intended receiver(s). Additional applications of keyed hash functions include their use in challege-response identification protocols for computing responses. which are a function of both a secret key and a challenge message.

An HMAC function is used by the originator to produce a value (the MAC) that is formed by condensing the secret key and the message input. The MAC is typically sent to the message receiver along with the message. The receiver computes the MAC on the received message using the same key and HMAC function as was used by the originator, and compares the result computed with the received MAC. If the two values match, the message has been correctly received, and the receiver is assured that the message originator is a member of the community of users that share the key.

Start Authority

Authority: Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology after approval by the Secretary of Commerce pursuant to section 5131 of the Information Technology Management Reform Act of 1996 and the Computer Security Act of 1987, Public Law 100-2235.

End Authority

E.O. 12866: This notice has been determined to be non-significant for the purposes of E. O. 12866.

Start Signature

Dated: January 2, 2001.

Karen H. Brown,

Deputy Director, NIST.

End Signature End Supplemental Information

[FR Doc. 01-381 Filed 1-4-01; 8:45 am]

BILLING CODE 3510-CN-M