I know that NMAC is mathematically proved with two different keys with length $L$.
But, if I choose to implement a MAC this way: $$H(k \operatorname\| H(k \operatorname\| msg))$$ with a key $k$ of length $2L$, am I vulnerable to some attacks?
I know that NMAC is mathematically proved with two different keys with length $L$.
But, if I choose to implement a MAC this way: $$H(k \operatorname\| H(k \operatorname\| msg))$$ with a key $k$ of length $2L$, am I vulnerable to some attacks?