Slide 1 Slide 2 1. CRYPTOGRAPHIC HASH FUNCTIONS 2. MESSAGE AUTHENTICATION CODES 3. DIGITAL SIGNATURES 2 Slide 3 Applications of Cryptographic Hash Functions Two…