This video was created for students in my college Cryptology course (at tonysako.com). In this video you will learn the main categories of systems that use cryptographic hash functions, how hash functions are used in cryptology and general cybersecurity, and the process for generating and comparing hash values for authentication.
