Demonstrating Cryptographic Hash, Signatures, and Authentication