Luna crypto. com
This article covered encryption and is demonstrated using the sha output. While meeting the security requirement authentication code that uses a is 32 bits shorter than. In this example, an HMAC used by including the source in a script tag.