In this chapter, we will be talking about “keyed hashes” and how asymmetric cryptography can be used to provide not only message privacy but also message integrity and authenticity via digital signatures. We will also be talking about how certificates differ from keys and why that distinction is important. Let’s dive right into an example and some code!
An Overly Simplistic Message Authentication Code (MAC)
Checking in with Alice and Bob, our East Antarctic espionage ...