This document provides an overview of cryptographic hash functions. It defines hash functions and their key properties like one-wayness and collision resistance. It describes common hash functions like SHA-1, SHA-2 (SHA-256, SHA-384 etc.), and the new SHA-3 standard. It explains how hash functions are used for message authentication codes (MACs), digital signatures, password storage and other applications. It also discusses attacks on hash functions like brute force and birthday paradox attacks.