CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Hashing Past and Present

Objective:

  • Students will:
    • Be able to explain the fundamental concepts of hashing and its historical development in computer science.
    • Identify and compare various hash functions, including MD5, SHA-1, SHA-2, and SHA-3, along with their applications and vulnerabilities.
    • Discuss the role of hashing in data integrity, security, and modern technologies such as blockchain.
    • Evaluate the implications of current challenges in hashing and consider future trends in cryptography, especially in the context of quantum computing.

Standards:

CompTIA Security+ SYO-701 Objective:

1.4 – Explain the importance of using appropriate cryptographic solutions

  • Hashing
  • Salting

    Guiding Question:

    What are the different types of encryption?

    Resources:

    • Lesson 2.3.1 – Hashing Past and Present.pptx and Lab 2.3.1 – Hashing.pptx presentations and Lab 2.3.1 – Hashing Activity sheet available on Google Classroom

    Assignment:

    1. Read the Lesson 2.3.1 – Hashing Past and Present.pptx presentation in today’s class.
    2. Complete the Lab 2.3.1 – Hashing Activity Form using the Lab 2.3.1 – Hashing.pptx Powerpoint Presentation posted in the Google Classroom.
    3. Hand in the completed Lab 2.3.1 – Hashing Activity Form to complete the lab (50 pts).

    Assigned: April 15th, 2026
    Teacher Pacing Due Date: April 16th, 2026