Message Authentication Code (MAC) and HMAC

    Exercise
    Demonstrate how HMAC algorithm is used for message authentication. List the steps involved in the generation of the HMAC code.