Tag

HMAC

1 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Jan 24, 2024 · Information Security

Using Python hashlib and hmac Modules for Data Security in API Automation

This article explains how Python's hashlib and hmac modules can be applied in API automation to compute hashes, generate salted password hashes, create HMACs, verify data integrity, encrypt sensitive information, and produce secure tokens, providing ten practical code examples.

API automationEncryptionHMAC
0 likes · 6 min read
Using Python hashlib and hmac Modules for Data Security in API Automation
Efficient Ops
Efficient Ops
Feb 8, 2023 · Information Security

Why Sessions Burden Servers and How Token‑Based Authentication Solves It

This article traces the evolution from simple web page browsing to modern token‑based authentication, explaining the scalability and security problems of server‑side sessions and showing how signed, stateless tokens using HMAC‑SHA256 eliminate those issues while supporting horizontal scaling and cross‑platform access.

HMACStatelessWeb Security
0 likes · 13 min read
Why Sessions Burden Servers and How Token‑Based Authentication Solves It
Top Architect
Top Architect
Jan 11, 2022 · Information Security

Comprehensive Guide to Authentication: UI Login, API Call Verification, SSO, and CAS

This article provides a detailed overview of authentication mechanisms, covering UI login methods such as Basic, LDAP, OAuth, Kerberos, and SSO, API call verification techniques like HMAC and JWT, and practical design guidelines for implementing SSO with CAS in micro‑service architectures.

AuthenticationCASHMAC
0 likes · 18 min read
Comprehensive Guide to Authentication: UI Login, API Call Verification, SSO, and CAS
Laravel Tech Community
Laravel Tech Community
May 13, 2021 · Backend Development

Using hash_hmac() to Generate HMAC Hashes with a Key in PHP

This article explains PHP’s hash_hmac() function, detailing its signature, the required algorithm, data, key, and raw_output parameters, describing the returned hash format, and providing a complete example with code and the resulting hash output.

HMACPHPbackend
0 likes · 2 min read
Using hash_hmac() to Generate HMAC Hashes with a Key in PHP
Laravel Tech Community
Laravel Tech Community
May 12, 2021 · Backend Development

hash_hmac_file() – Generating a Keyed HMAC Hash of a File’s Contents

hash_hmac_file() is a PHP function that computes a keyed HMAC hash of a file using a specified algorithm and secret key, returning either a raw binary digest or a lowercase hexadecimal string, with detailed parameter explanations and a complete usage example.

Backend DevelopmentFile HashingHMAC
0 likes · 2 min read
hash_hmac_file() – Generating a Keyed HMAC Hash of a File’s Contents
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACStateless
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
Top Architect
Top Architect
Jun 19, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication

The article traces the history of web session handling, explains the scalability and security challenges of server‑side sessions, and introduces stateless token‑based authentication using signed HMAC‑SHA256 tokens as a modern solution for scalable, secure web applications.

AuthenticationHMACStateless
0 likes · 14 min read
Evolution of Session Management and Token‑Based Authentication