. . . "Hash functions and the corresponding hash values they generate may be used not only to uniquely identify a packet, but also to provide authentication and verification of a packet, document or other information associated with a hash value." . .