In this module, we will discuss symmetric and asymmetric encryption, cryptographic hash functions, hash chains, and applications of hash functions.