tcpm-1----Page:9
1  2  3  4  5  6  7  8  9 

Choosing Hash Algorithms
Late binding of hash algorithms to TCP sessions
HMAC-SHA-1-96 is highly desirable
Relatively strong
Not computationally expensive
Twelve byte hash value
PPT Version