HMAC
Overview
HMAC can be expanded as any variation of hashed message authentication code, keyed-hash message authentication code or hash-based message authentication code
What HMAC does
- Verify the integrity of a message (that it hasn't been tampered with between the source and destination)
- Verify the authenticity of the message (that it came from a trusted sender)
What HMAC does not do
- The message contents are not encrypted by the HMAC algorithm (though it's possible to choose to encrypt the message independent of HMAC)