Talk:HMAC/to do


 * Describe the actual construction.
 * Describe how the security of HMAC relates to the underlying hash function.
 * Describe the advantages of using HMAC over the underlying hash.