Unit 4 Learning Outcomes
Upon successful completion of this unit, students will be able to:
- Explain what cryptographic hash is. Use hash function in a computer.
- Describe MD5 hash function and the collision vulnerabilities associated with it.
- Describe SHA-1 hash function.
Last modified: Friday, July 15, 2016, 1:48 PM