HMAC - Wikipedia
OverviewDetailsImplementationDesign principlesSecurityExamplesExternal linksAny cryptographic hash function, such as SHA-2 or SHA-3, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-X, where X is the hash function used (e.g. HMAC-SHA256 or HMAC-SHA3-512). The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key.
DA: 12 PA: 44 MOZ Rank: 79