Chapter 4 Cryptographic Hash Functions Outline 4.1 Hash Functions and Data Integrity 4.2 Security of Hash Functions 4.3 Iterated Hash Functions 4.4 Message Authentication…