I'd like to know how I could verify the signature I created. My code to create a signature looks similar to this one: HMAC-SHA1: How to do it properly in Java?
I send the message, the signature and the public key to verify the signature. Public and private key are generated using KeyPairGenerator
.
How can I use the public key to verify my signature? Or maybe can you suggest any good libraries for Java for signing and verifying signature that use HMAC SHA1?
First to clarify, the HMAC code does not generate a signature. It is a type of Message Authentication Code (MAC).
The latter link explains the difference between a signature and a MAC this way:
So in order to verify an HMAC, you need to share the key that was used to generate it. You would send the message, the HMAC, and the receiver would have the same key you used to generate the HMAC. They could then use the same algorithm to generate an HMAC from your message, and it should match the HMAC you sent. Public/private keys (assymetric) are not used for this. You need to generate a symmetric key (like AES) and securely share that with the people that will be generating/verifying the HMAC.
This limits the HMAC to having
integrity
andauthenticity
properties only, and notnon-repudiation
.The quote above mentioned that hardware security modules could be used to enforce the key use, and then you could get non-repudiation as long as only one person could use the key for generating the HMAC.
Alternatively, you could use a hybrid approach. Use a shared symmetric key to generate the HMAC. The HMAC in the end is a hash. You could then sign this hash with your private key (different than the key used in the HMAC). A third party with the symmetric key and your public key could verify you signed the HMAC, and could generate their own HMAC with the message and the shared key to make sure it matched. This would also give you non-repudiation.
If you want to go this route, use the Java Signature class. The HMAC algorithm is SHA-1, and assuming your keypair is RSA, you could use the
NONEwithRSA
Signature algorithm since the input is already a SHA-1 hash. Or you could hash it again with theSHA1withRSA
algorithm. As long as you generate the signature and verify with the same algorithm, it should be OK.