“…Further, HMAC's cryptographic strength basically relies on the quality and size of the key, hash output length in bits, and the cryptographic strength of the chosen hash function [6], [7]. One of the well-known hash algorithms is MD5 due to its extensive availability and shorter length [8].…”