ARTICLE

Data Authentication with Keyed Hashing

By Dennis Byrne

This article explores securing data using keyed hashing in Python.

Take 40% off Practical Python Security by entering fccbyrne into the discount box at checkout at manning.com.

Data authentication

Suppose Alice, a computer programmer, wants to secure the data of a document management system. The system currently stores each new document with a hash value. To verify the integrity of a document the system rehashes…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store