This document provides an overview of hash algorithms and their uses in cryptography. It begins with definitions of hash functions and their properties like producing a fixed-length output and being one-way. Common hash algorithms are then discussed like MD5, SHA-1, and RIPEMD-160. The document explains the structures and security of these algorithms and analyzes attacks like birthday attacks. It also provides examples of applying hash functions in cryptography.