Abstract :
The annual CRYPTO conference held in August 2013 generated several discussions about developments in cryptography. The author states that hash functions play an important cryptography by supplying a nearly number to any piece of data. The years since MD5´s weaknesses became known have led to an unsettled feeling about how to design hash functions.