Redigera

Dela via


HMACRIPEMD160 Constructors

Definition

Initializes a new instance of the HMACRIPEMD160 class.

Overloads

HMACRIPEMD160()

Initializes a new instance of the HMACRIPEMD160 class with a randomly generated 64-byte key.

HMACRIPEMD160(Byte[])

Initializes a new instance of the HMACRIPEMD160 class with the specified key data.

HMACRIPEMD160()

Initializes a new instance of the HMACRIPEMD160 class with a randomly generated 64-byte key.

public:
 HMACRIPEMD160();
public HMACRIPEMD160 ();
Public Sub New ()

Remarks

HMACRIPEMD160 is a type of keyed hash algorithm that is constructed from the RIPEMD-160 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 160 bytes in length.

This constructor uses a 64-byte, randomly generated key.

See also

Applies to

HMACRIPEMD160(Byte[])

Initializes a new instance of the HMACRIPEMD160 class with the specified key data.

public:
 HMACRIPEMD160(cli::array <System::Byte> ^ key);
public HMACRIPEMD160 (byte[] key);
new System.Security.Cryptography.HMACRIPEMD160 : byte[] -> System.Security.Cryptography.HMACRIPEMD160
Public Sub New (key As Byte())

Parameters

key
Byte[]

The secret key for HMACRIPEMD160 encryption. The key can be any length, but if it is more than 64 bytes long it is hashed (using SHA-1) to derive a 64-byte key. Therefore, the recommended size of the secret key is 64 bytes.

Exceptions

The key parameter is null.

Examples

For an example of how to use this constructor, see the HMACRIPEMD160 class.

Remarks

HMACRIPEMD160 is a type of keyed hash algorithm that is constructed from the RIPEMD-160 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 160 bytes in length.

See also

Applies to