Yes my mistake and why I initially apologised for coming in to the conversation late.
I foolishly thought the discussion was along the same plane of thought I had about applying encryption to the data stream. Oh well sorry for wasting your time. Regards Eric On 2016-08-28 03:42, Dean Hall wrote: > AES is a symmetric (1 key) algorithm, so > the recipient must use the original key to verify the HMAC. > > If you use AES to make a signature, you have to get the original key > to your recipient and trust (s)he doesn't share it. > So you can't really use symmetric algorithms to authenticate > your messages if your target is the general public > because you'd have to share your key with everyone > (and a bad actor could turn around and imitate you). > > This is why we use asymmetric algorithms for digital signatures. > > !!Dean > KC4KSU > > On Aug 27, 2016, at 8:29 PM, Steve wrote: > >> Dean, the AES STM32 library does have three HMAC (one-way) hash algorithms >> built-in. Four if you count MD5, but no one counts that anymore :-) 73/steve >> ------------------------------------------------------------------------------ >> _______________________________________________ Freetel-codec2 mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/freetel-codec2 [1] > > ------------------------------------------------------------------------------ > _______________________________________________ > Freetel-codec2 mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/freetel-codec2 [1] Links: ------ [1] https://lists.sourceforge.net/lists/listinfo/freetel-codec2
------------------------------------------------------------------------------
_______________________________________________ Freetel-codec2 mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/freetel-codec2
