Abstract: This article discusses the structural diagrams involved in generating an authenticated message using the complex modified UMAC algorithm, which is based on modified Rao-Nama crypto-code ...