This video was created for students in my college Cryptology course (at tonysako.com). In this video you will learn the general design of cryptographic hash functions, how they divide the input into blocks, ensure the last block is full using padding, copy an input block into an internal state array, perform rounds of scrambling on the array, then use an iterative process to process all the blocks of input.
