Exercise Demonstrate how HMAC algorithm is used for message authentication. List the steps involved in the generation of the HMAC code.