This assignment contains three problems: Problem 1 involves the implementation of four cryptographic programs, used for hashing,