tcpm-1----Page:9
1
2
3
4
5
6
7
8
9
Choosing Hash Algorithms
Late binding of hash algorithms to TCP sessions
HMAC-SHA-1-96 is highly desirable
Relatively strong
Not computationally expensive
Twelve byte hash value
PPT Version