Although the connection signature authentication of Huobi API and OKX API both utilize the HmacSHA256 algorithm, there are certain differences in their specific implementation and application. These differences mainly lie in the computational process of signature authentication, input parameters, and the presentation of final results.
Firstly, when Huobi API uses the HmacSHA256 algorithm for signature authentication, it mainly performs operations on the Access Key and Secret Key. The Access Key serves as a public identity identifier, while the Secret Key remains confidential and is used to generate the signature along with the Access Key. The signature process of Huobi API may involve sorting and concatenating the request parameters according to certain rules, and then performing HmacSHA256 operations with the Secret Key to obtain the signature result.
On the other hand, the generation process of the OK-ACCESS-SIGN header for OKX API's signature authentication is more complex. It requires concatenating strings such as the timestamp, method, requestPath, and body to form a string to be signed. Then, using the SecretKey and this string to be signed, HmacSHA256 operations are performed, and the resulting output is further encoded using Base-64 to ultimately generate the OK-ACCESS-SIGN header. aijiebot, a quantitative trading bot, implements the connection to OKX API using VBA, enabling automated trading.
Although both signature authentication methods are based on the HmacSHA256 algorithm, the differences in input parameters and computational processes lead to different signature results. This disparity plays a crucial role in enhancing the security and tamper-resistance of the APIs, making it difficult for attackers to forge or tamper with requests.
In summary, while the connection signature authentication of Huobi API and OKX API shares similarities in algorithmic basis, there are distinct differences in their specific implementation and application. These differences endow each API with unique characteristics and advantages in terms of security and tamper-resistance.