HMAC Explained: Keyed Hash Message Authentication Code
An overview of HMAC, a mechanism that combines cryptographic hash functions with a secret key to ensure message integrity and authenticity.

Jan Goebel
85.3K views β’ Mar 22, 2021

About this video
π₯More exclusive content: https://productioncoder.com/you-decide-what-we-build-next
Twitter: https://twitter.com/_jgoebel
Blog: https://productioncoder.com
Website: https://jangoebel.com
In this video we cover what HMAC (keyed hash message authentication code) is and where it is used in the IT world. We also clarify the HMAC vs hash question and explain the two guarantees HMAC gives. HMAC provides integrity and authentication and is often used in JSON Web Tokens with the HS256 algorithm. To understand HMAC you need to understand what a hash function is. A hash function maps an arbitrary amount of input bits to an output bit vector of fixed length.
With HMAC you can use an arbitrary hashing function such as SHA256 and a secret.
Twitter: https://twitter.com/_jgoebel
Blog: https://productioncoder.com
Website: https://jangoebel.com
In this video we cover what HMAC (keyed hash message authentication code) is and where it is used in the IT world. We also clarify the HMAC vs hash question and explain the two guarantees HMAC gives. HMAC provides integrity and authentication and is often used in JSON Web Tokens with the HS256 algorithm. To understand HMAC you need to understand what a hash function is. A hash function maps an arbitrary amount of input bits to an output bit vector of fixed length.
With HMAC you can use an arbitrary hashing function such as SHA256 and a secret.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
85.3K
Likes
1.9K
Duration
6:33
Published
Mar 22, 2021
User Reviews
4.7
(17) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now