• Describe the actual construction.
  • Describe how the security of HMAC relates to the underlying hash function.
  • Describe the advantages of using HMAC over the underlying hash.