“…Much studies have proposed different techniques to make HMAC more resistant against attacks especially exhaustive and birthday attacks. To determine how secured these techniques are, various assessments or evaluations such as avalanche effect, brute-force attack, randomness, and cryptanalysis were performed to provide validation of their performance [9], [10].…”