“…As with any MAC, it may be utilized to validate both the authenticity and integrity of the message at the same time. Further, HMAC's cryptographic strength basically relies on the quality and size of the key, hash output length in bits, and the cryptographic strength of the chosen hash function [6], [7]. One of the well-known hash algorithms is MD5 due to its extensive availability and shorter length [8].…”