This document discusses cryptographic hash functions. It provides an overview of their usage, properties, structure, and attacks. Hash functions map messages of arbitrary length to fixed-length digests. They are used for applications like file integrity verification, password storage, and digital signatures. The document outlines the design of common hash functions like MD5 and SHA-1/2, and notes that MD5 is insecure while SHA-1 is becoming outdated. It discusses the need for a new secure hash standard, and the NIST SHA-3 competition to select standardized replacement functions.