# Problem 79

# Learn about a crypto hash

**Due**: April 12

**Points**: 1-2

Look up a hash function that is considered cryptographically secure, such as MD5, SHA-1, SHA-256, Skein, or Keccak.

Using **at least two sources** that you document, tell me about the most interesting features of this hash function, such as:

- Is it actually used in practice? If so, where?
- Is this hash function still considered secure? Have there been any successful "attacks" against it?
- How does it compare to Carter & Wegman hash functions in terms of speed?

Finally, find an implementation of your hash function somewhere, compute the hash of your last name, and write that down.

**1 point bonus if you learn about a hash function that no one else picks.**