Discussion Post: Cryptography
Describe a cryptographic hash function and how it is used as a security application.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.