provides for data integrity, takes a variable length input and generates a fixed length output.
hashing
2 different (inputs) messages and get same output, called birthday attack.
collision
type of MAC calculated by using specific algorithm involving hash function combined w/secret key (symmetric key), as with any MAC can verify authenticity and integrity of message.
HMAC
FORK-256-bit / GOST-256-bit (Russian) / TIGER-192-bit / RIPEMD-160-bit / SHA256-256-bit
Hashing Algorithms