ARTICLE
Data Authentication with Keyed Hashing
By Dennis Byrne
11 min readJun 16, 2021
This article explores securing data using keyed hashing in Python.
Take 40% off Practical Python Security by entering fccbyrne into the discount box at checkout at manning.com.
Data authentication
Suppose Alice, a computer programmer, wants to secure the data of a document management system. The system currently stores each new document with a hash value. To verify the integrity of a document the system rehashes…