Hash functions. Collision resistance. Examples. SHA256. Birthday attack and its analysis. The MD transform. Theorem showing MD works. Compression functions. Davies-Meyer compression function. Attacks on MD5, SHA1. SHA3. Speculations on how well cryptographers do at hash function design.