Unit 4 Learning Outcomes

Upon successful completion of this unit, students will be able to:

  • Explain what cryptographic hash is. Use hash function in a computer.
  • Describe MD5 hash function and the collision vulnerabilities associated with it.
  • Describe SHA-1 hash function.
Last modified: Friday, July 15, 2016, 1:48 PM