saag-2----Page:8
1  2  3  4  5  6  7  8  9  10 

SHA-1 Attacks: No impact
HOTP is based on HMAC
HMAC is not a hash function, it uses a hash function internally
A MAC depends on a secret key
The issues with MAC constructions is forgery, not collisions
Best example: MD5 is broken, though no attack on HMAC-MD5
PPT Version