Completion requirements
View
This video goes into greater detail regarding how to apply hash functions in authentication architectures. Since hash functions are simple to implement and computationally efficient, they are an excellent choice for achieving authentication. To make them even more secure, keyed versions of the hash can be incorporated. Use this material to learn about techniques for implementing keyed hash functions.
Source: Steven Gordon, https://www.youtube.com/watch?v=zeGS04UgVgo This work is licensed under a Creative Commons Attribution 3.0 License.