A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the
nature if the data that is being sent back and forth from the client application to the server, the developer would
like to change the cryptographic function to one that verities both authentication and message integrity. Which
of the following algorithms should the software developer utilize?