diff --git a/go.mod b/go.mod
index 7435fe0fc450adc92439356079d986ace2a536cb..d235193b2a6e45b6c6437124133caf4a446bee9f 100644
--- a/go.mod
+++ b/go.mod
@@ -20,7 +20,7 @@ require (
 	github.com/spf13/viper v1.7.1
 	gitlab.com/elixxir/bloomfilter v0.0.0-20200930191214-10e9ac31b228
 	gitlab.com/elixxir/comms v0.0.4-0.20220104182551-5f9da6b4a832
-	gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a
+	gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6
 	gitlab.com/elixxir/ekv v0.1.6
 	gitlab.com/elixxir/primitives v0.0.3-0.20220104173924-275cb9d7834f
 	gitlab.com/xx_network/comms v0.0.4-0.20211227194445-c099754b3cda
diff --git a/go.sum b/go.sum
index 4a9d2a81379a3e0a65cd5b0749b098c877870410..cc2697392bb4908955ee59bde983636579cb30cc 100644
--- a/go.sum
+++ b/go.sum
@@ -276,6 +276,8 @@ gitlab.com/elixxir/crypto v0.0.0-20200804182833-984246dea2c4/go.mod h1:ucm9SFKJo
 gitlab.com/elixxir/crypto v0.0.3/go.mod h1:ZNgBOblhYToR4m8tj4cMvJ9UsJAUKq+p0gCp07WQmhA=
 gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a h1:tnsmzW+NJuTJhda0/IYQa/RD41pH0TK36Z50cG0mdV4=
 gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a/go.mod h1:qmW0OGPB21GcaGg1Jvt527/qUw7ke6W8DKCiYBfsx48=
+gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6 h1:/ZZzlUqeeN+VWnaU+MfOJ743VnkhrUrSWO9pdz9PJHU=
+gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6/go.mod h1:qmW0OGPB21GcaGg1Jvt527/qUw7ke6W8DKCiYBfsx48=
 gitlab.com/elixxir/ekv v0.1.6 h1:M2hUSNhH/ChxDd+s8xBqSEKgoPtmE6hOEBqQ73KbN6A=
 gitlab.com/elixxir/ekv v0.1.6/go.mod h1:e6WPUt97taFZe5PFLPb1Dupk7tqmDCTQu1kkstqJvw4=
 gitlab.com/elixxir/primitives v0.0.0-20200731184040-494269b53b4d/go.mod h1:OQgUZq7SjnE0b+8+iIAT2eqQF+2IFHn73tOo+aV11mg=
diff --git a/network/node/register.go b/network/node/register.go
index 3e19eb6750aa7bd040e12625ef1cf3bb0852ed0a..37cf86074cec920600e4f5fc90f3606c7d01a390 100644
--- a/network/node/register.go
+++ b/network/node/register.go
@@ -272,7 +272,7 @@ func requestKey(sender *gateway.Sender, comms RegisterNodeCommsInterface,
 	// Verify the HMAC
 	h.Reset()
 	if !registration.VerifyClientHMAC(sessionKey.Bytes(), keyResponse.EncryptedClientKey,
-		h, keyResponse.EncryptedClientKeyHMAC) {
+		opts.Hash.New, keyResponse.EncryptedClientKeyHMAC) {
 		return nil, nil, 0, errors.WithMessagef(err, "Failed to verify client HMAC")
 	}