Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.
Define the uses of hash functions.
A technique called hashing, which is the application of a hash function (or hash algorithm) to a portion of data, can be used to provide integrity and authentication. Hashing creates a unique digital “fingerprint” for each message. The hash function is a transformation process that converts a variable-size string of characters into a fixed-size value (called the hash value). If someone changes the information by even a single binary digit, the hash produces a completely different hash value. Thus, hashing can ensure the integrity of the data.
A Message Authentication Code (MAC) can add ...