[Ndn-interest] Describe the HMAC algorithm in SignatureHmacWithSha256?

Thompson, Jeff jefft0 at remap.UCLA.EDU
Tue Jun 9 08:29:50 PDT 2015


> I think the purpose is to allow both ends to uniquely identify the key. Is there any particular reason of using the first 4 bytes of the digest?

Using a short identifier (4 bytes) is to keep the packet short for low-power devices. Making a short identifier from the digest is an easy way to get a unique identifier instead of maintaining a separate list of sequential ID numbers. Does that answer your question?

- Jeff T

From: Yingdi Yu <yingdi at cs.ucla.edu<mailto:yingdi at cs.ucla.edu>>
Date: Monday, June 8, 2015 at 16:44
To: Jeff Thompson <jefft0 at remap.ucla.edu<mailto:jefft0 at remap.ucla.edu>>
Cc: Marc Mosko <Marc.Mosko at parc.com<mailto:Marc.Mosko at parc.com>>, "Ndn-interest at lists.cs.ucla.edu<mailto:Ndn-interest at lists.cs.ucla.edu>" <Ndn-interest at lists.cs.ucla.edu<mailto:Ndn-interest at lists.cs.ucla.edu>>
Subject: Re: [Ndn-interest] Describe the HMAC algorithm in SignatureHmacWithSha256?

Hi Jeff,

On Jun 8, 2015, at 2:57 PM, Thompson, Jeff <jefft0 at remap.ucla.edu<mailto:jefft0 at remap.ucla.edu>> wrote:

If the application uses a truncated key digest (e.g. the first 4 bytes of the digest), do you think we can still use the KeyDigest field?  Or, if we treat the truncated key digest as a KeyId and put it in a Name, should the spec suggest a format for the Name?

I would prefer to keep KeyDigest literally (i.e., the real sha256 digest of a key), so that it is consistent with other scenarios (e.g., KeyDigest of public key).

For the key name, I think the purpose is to allow both ends to uniquely identify the key. Is there any particular reason of using the first 4 bytes of the digest?

Yingdi
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.lists.cs.ucla.edu/pipermail/ndn-interest/attachments/20150609/9ec73e40/attachment.html>


More information about the Ndn-interest mailing list