
|
SHA-1 Attacks: No impact HOTP is based on HMAC HMAC is not a hash function, it uses a hash function internally A MAC depends on a secret key The issues with MAC constructions is forgery, not collisions Best example: MD5 is broken, though no attack on HMAC-MD5 |