ARTICLE

Data Authentication with Keyed Hashing

This article explores securing data using keyed hashing in Python.

Data authentication

Suppose Alice, a computer programmer, wants to secure the data of a document management system. The system currently stores each new document with a hash value. To verify the integrity of a document the system rehashes…