Team:Davidson-Missouri Western/Applications of Hash Functions

From 2008.igem.org

  • Prove authentication of document
  • Protect Government Documents
  • Minimize Cheating on Standardized Tests
  • Protect Lengthy and Important Instructions
  • Protect Financial Transactions
  • Protect Passwords
  • Detect tampered pictures (pictures that have been photo-shopped)
  • Detect tampered pictures with hidden info (terrorists)