Watch this video on YouTube
Which of the following cryptographic mechanisms is used to verify the integrity and authenticity of a message by combining a hash function with a secret key?