Learn about a crypto hashDue: April 12
Look up a hash function that is considered cryptographically secure, such as MD5, SHA-1, SHA-256, Skein, or Keccak.
Using at least two sources that you document, tell me about the most interesting features of this hash function, such as:
- Is it actually used in practice? If so, where?
- Is this hash function still considered secure? Have there been any successful "attacks" against it?
- How does it compare to Carter & Wegman hash functions in terms of speed?
Finally, find an implementation of your hash function somewhere, compute the hash of your last name, and write that down.
1 point bonus if you learn about a hash function that no one else picks.