This lecture covers the design and evolution of cryptographic hash functions, focusing on SHA1, SHA2, and SHA3. It explains the sponge construction used in SHA3, the matrix structure in Kitchak, and the transformations involved in the permutation F. The lecture also delves into the concept of message authentication codes, the security properties of HMAC, and the vulnerabilities of CBC-MAC. Additionally, it introduces the WC-MAC and P-MAC constructions, showcasing how universal hash functions can be used for message authentication. The session concludes with a discussion on integrating MAC with encryption and authenticated modes of operation for block ciphers.