How are hash functions used in message authentication?

A hash function maps a variable-length message into a fixed length hash value, or message digest. For message authentication, a secure hash function must be combined in some fashion with a secret key. Perhaps the most confusing area of network security is that of message authentication and the related topic of digital signatures.
For More Information Please Refer:

You May Also Like to Read: