Timeline for Using a random string to authenticate HMAC?
Current License: CC BY-SA 3.0
4 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Oct 24, 2012 at 7:37 | answer | added | barerd | timeline score: 1 | |
| Oct 24, 2012 at 1:27 | comment | added | mrwooster | It is a web service which does some processing/analysis on the 'message' and returns that information. The only security goal is to rate limit the API requests and have the ability to identify the user making the request (I.e. to allow different rate limits for different users) | |
| Oct 24, 2012 at 1:15 | comment | added | K.Steff | Why do you need MAC if you don't care for message integrity? A little bit more details about your security goals would be useful. | |
| Oct 24, 2012 at 0:40 | history | asked | mrwooster | CC BY-SA 3.0 |