Cisco Device Hashes
[Hashing Home][Home]
HMAC is used as a message access code with a hash and a key:
|
Outline
In this case we use Python code to generate the HMAC hashes with various keys:
import hashlib; import hmac; string = "password" key="bill" print "HMAC (MD5): "+hmac.new(key, string,hashlib.md5).hexdigest() print "HMAC (SHA1): "+hmac.new(key, string, hashlib.sha1).hexdigest() print "HMAC (SHA224): "+hmac.new(key, string, hashlib.sha224).hexdigest() print "HMAC (SHA256): "+hmac.new(key, string, hashlib.sha256).hexdigest() print "HMAC (SHA384): "+hmac.new(key, string, hashlib.sha384).hexdigest() print "HMAC (SHA512): "+hmac.new(key, string, hashlib.sha512).hexdigest()
A sample run is for "password" and a key of "bill":
HMAC (MD5): d05e4826b68ade6705b09f50abf8456d HMAC (SHA1): 6ec0041c6ef1d79dfa8aa6daa79b48d690736a1e HMAC (SHA224): b9d380c92043a853494643784d454bd516c2446a72c9d37c5bb74934 HMAC (SHA256): 031f225bc62d93beb0543f6d8836e94c98a7c462eb5ba9d9a2606c03e2452cf1 HMAC (SHA384): 4b68107c6358ed3ca06fc924d03ac3480f8fb694ae257c9df09bb4b0d4c02e2e66f76a0bea9777698592897516c4fa68 HMAC (SHA512): f79e85281fc2bc512f63567fed479ffe19c11c279a124161bd3ab41786a37752f809cacc8d09f39bf0e401bfe7d7ff46e28c2260e5f7b7e654656a30ad297835