The contents of this chapter include all of the following: Hash functions, cryptographic hash function, hash functions & message authentication, hash functions & digital signatures, other hash function uses, two simple insecure hash functions, attacks on hash functions. |