Score:0

What is the need of xor-ing the key with an outer and inner pad in HMAC?

ec flag

enter image description here

The diagram above shows the standard HMAC algorithm. However consider the algorithm of HMAC without xoring the key with outer or inner pad. In other words let the structure of HMAC remain the same without xoring the key with outer and inner pad. Let the key go in as input alone at both points. Is it possible to commit existential forgery with this modified architecture ?

I understand that the standard HMAC architecture prevents an attacker from computing MACs for extended messages (i.e. message blocks appended to a message for which MAC is known). But in my view this can also be prevented without xoring with inner and outer pad. Please suggest.

kelalaka avatar
in flag
I suggest a little [search](https://crypto.stackexchange.com/search?q=HMAC+ipad+) 1) [What do the magic numbers 0x5c and 0x36 in the opad/ipad calc in HMAC do?](https://crypto.stackexchange.com/a/3006/18298) 2) [HMAC ipad and opad choice](https://crypto.stackexchange.com/q/20695/18298) 3) [Keys in HMAC and NMAC](https://crypto.stackexchange.com/q/27051/18298)
us flag
Does this answer your question? [What do the magic numbers 0x5c and 0x36 in the opad/ipad calc in HMAC do?](https://crypto.stackexchange.com/questions/3005/what-do-the-magic-numbers-0x5c-and-0x36-in-the-opad-ipad-calc-in-hmac-do)
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.