Crypto hash functions look magical but are in fact built of the simplest operations. Their reputation as black boxes which can uniquely fingerprint arbitrary amounts of data can led to their misuse. Add to this the fact that several once secure hash functions have been fundamentally broken and this can leave applications open to attack. In this talk we will look at the internals of some common hash functions and what that means for their use.