|
|||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||
SUMMARY: INNER | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |
java.lang.Object | +--javax.crypto.Mac
Engine class for algorithm independent MAC object creation.
Attention: This is not a SUN implementation!
This class has been developed by IAIK according to the documentation publicly
available.
For SUN´s documentation of this class see
http://java.sun.com/security/JCE1.2/spec/apidoc/index.html
This class represents the super API class to be used for providing data integrity based on a Message Authentication Code (MAC).
A Message Authentiction Code (MAC) denotes a cryptocraphic checksum, which is derived by processing some given message (or the authentication elements of the message) using a secret key. A MAC computation that involves some cryptographic hash function is denoted as HMAC (as specified in RFC 2104). Since a secret key is used for processing the message, the resulting (H)MAC only can be verified with the same key, meaning that - in contrast to digital signing where anyone can verify a signature by using the public key matching to the private key that have been used for signing - only the holder of the same secret key ís able to verifiy the MAC. Commonly, only the addressed receiver(s) of the message should hold the same secret key.
MAC computation can be used for providing integrity without secrecy. The sender uses his secret key for computing the MAC of the message to be sent, appends the MAC to the original message and sends both to the communication partner. The receiver recalculates the MAC and compares it with the transmitted MAC to ensure the integrity of the received data.
An application wishing to perform a MAC computation, at first has to create a MAC
object by instantiating this class through a proper getInstance
factory
method thereby specifying the MAC algorithm to be used. Calculating, for instance,
a HMAC based on the SHA-1 hash algorithm, may be initiated as follows:
MAC sha_HMAC = MAC.getInstance("HMAC/SHA");
After properly initializing the MAC object with one entity´s secret key, the data
to be processed is applied by one (or more) calls to the update
methods.
The MAC computation is concluded by using doFinal
. If the data can be
processed without calling any update
method, doFinal
can
be called immediately after initializing
the MAC object:
sha_HMAC.init(secret_key); byte[] mac_data = sha_HMAC.doFinal(data);
After the MAC finally has been calculated, the MAC object automatically is reset for being able to be used for further MAC computations, either by using the same secret key again, or using a new key by properly re-initializing this MAC object.
IAIK-JCE supports HMAC computation based on the SHA-1 and Md5 hash algorithms.
HMac
,
HMacSha
,
HMacMd5
Constructor Summary | |
protected |
Mac(MacSpi macSpi,
Provider provider,
String algorithm)
Creates a MAC object. |
Method Summary | |
Object |
clone()
Returns a clone of this MAC object. |
byte[] |
doFinal()
Returns the calculated MAC value. |
byte[] |
doFinal(byte[] input)
Returns the calculated MAC value after finishing this MAC computation by processing the given data, supplied in a byte array. |
void |
doFinal(byte[] output,
int outOffset)
Finishes this MAC computation and writes the calculated MAC value to the given output byte array, beginning at the given position. |
String |
getAlgorithm()
Returns the standard name of the MAC algorithm in use. |
static Mac |
getInstance(String algorithm)
Returns the default provider MAC object implementation of the specified algorithm. |
static Mac |
getInstance(String algorithm,
String provider)
Returns a Mac object for the specified algorithm, implemented by the given provider. |
int |
getMacLength()
Returns the length of the created MAC value in bytes. |
Provider |
getProvider()
Returns the provider supplying this Mac object. |
void |
init(Key key)
Initializes this Mac object with the given secret key. |
void |
init(Key key,
AlgorithmParameterSpec params)
Initializes this Mac object with given secret key and algorithm parameter specification. |
void |
reset()
Resets this Mac object for being able to be used for further MAC computations, either by using the same secret key again, or using a new key by properly re-initializing this MAC object. |
void |
update(byte input)
Processes the given byte. |
void |
update(byte[] input)
Processes the given data, supplied as a byte array |
void |
update(byte[] input,
int offset,
int len)
Processes the given number of bytes, supplied in a byte array starting at the given position |
Methods inherited from class java.lang.Object |
equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait |
Constructor Detail |
protected Mac(MacSpi macSpi, Provider provider, String algorithm)
getInstance
factory methods for obtaining a MAC object.macSpi
- the SPI MAC implementation of the given providerprovider
- the provideralgorithm
- the MAC algorithm to be usedMethod Detail |
public final String getAlgorithm()
public static final Mac getInstance(String algorithm) throws NoSuchAlgorithmException
algorithm
- the name of the requested MAC algorithmNoSuchAlgorithmException
- if the requested MAC algorithm is not implemented.public static final Mac getInstance(String algorithm, String provider) throws NoSuchAlgorithmException, NoSuchProviderException
algorithm
- the name of the requested MAC algorithmprovider
- the name of the provider implementing this algorithmNoSuchAlgorithmException
- if the requested MAC algorithm is not implemented by the
given providerNoSuchProviderException
- if the requested provider cannot be fetchedpublic final Provider getProvider()
public final int getMacLength()
public final void init(Key key) throws InvalidKeyException
key
- the secret key for initializing this MAC object.InvalidKeyException
- if the given key cannot be used for initializing this MAC objectpublic final void init(Key key, AlgorithmParameterSpec params) throws InvalidKeyException, InvalidAlgorithmParameterException
key
- the secret key for initializing this MAC object.params
- the algorithm parameter specification.InvalidKeyException
- if the given key cannot be used for initializing this MAC objectInvalidAlgorithmParameterException
- if the given algorithm parameters do not match to this MAC objectpublic final void update(byte input) throws IllegalStateException
input
- the byte to be processed.IllegalStateException
- if this MAC object is not in a proper state for
performing an update
operationpublic final void update(byte[] input) throws IllegalStateException
input
- byte array holding the data to be processedIllegalStateException
- if this MAC object is not in a proper state for
performing an update
operationpublic final void update(byte[] input, int offset, int len) throws IllegalStateException
input
- the byte array holding the data to be processedoffset
- the offset indicating the start position within the input byte arraylen
- the number of bytes to be processedIllegalStateException
- if this MAC object is not in a proper state for
performing an update
operationpublic final byte[] doFinal() throws IllegalStateException
IllegalStateException
- if this cipher is in not in a proper state for performing a
doFinal
operationpublic final void doFinal(byte[] output, int outOffset) throws ShortBufferException, IllegalStateException
output
- the byte array for holding the calculated MAC valueoutOffset
- - the offset indicating the start position within the output byte array
to which the calculated MAC value is writtenShortBufferException
- if the given output buffer is too small for holding the resultIllegalStateException
- if this cipher is in not in a proper state for performing a
doFinal
operationpublic final byte[] doFinal(byte[] input) throws IllegalStateException
input
- the byte array holding the data to be processedIllegalStateException
- if this cipher is in not in a proper state for performing a
doFinal
operationpublic final void reset()
public final Object clone() throws CloneNotSupportedException
clone
in class Object
CloneNotSupportedException
- if this provider-specific MAC implementation is not cloneable
|
This Javadoc may contain text parts from Internet Standard specifications (RFC 2459, 3280, 3039, 2560, 1521, 821, 822, 2253, 1319, 1321, ,2630, 2631, 2268, 3058, 2984, 2104, 2144, 2040, 2311, 2279, see copyright note) and RSA Data Security Public-Key Cryptography Standards (PKCS#1,3,5,7,8,9,10,12, see copyright note). | ||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||
SUMMARY: INNER | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |