To guard against the interception and modification of VPN data, a data integrity algorithm can be used. A data integrity algorithm adds a hash to the message. If the transmitted hash matches the received hash, the received message is accepted as an exact copy of the transmitted message. Keyed Hashed Message Authentication Code (HMAC) is a data integrity algorithm that guarantees the integrity of the message. There are two common HMAC algorithms