Hashing
Collision attack
Preimage attack
MD5
SHA-2
Shadow password
HMAC
SHA-1
Crypt
Cryptography
Error detection and correction
Cryptographic hash functions