3.4.5.6 Message Protection Methods