• Key Hash
  • Example Truncated SHA-1 Values
  • Why SHA-1?
  • What about ID collisions?