Introduction to Information Security Lecture 5: Hash Functions and MAC 2009. 7. Prof. Kwangjo Kim * Introduction - Hash Function vs. MAC Hash Functions Security Requirements…