Question 1:
Outline the operational logic and theory of Hash Functions to include the aspects of their role in digital encryption methods, why they are important, and how they work.
Question 2:
Outline the primary logic and elements of the concept of Key Escrow to include the proponents' position the opponents' position, the science and methodology of implementing key escrow, types and names of the specific implementations, and the success or failure of the concept from its inception to today.
Question 3:
Discuss the WWII Navajo Code Talkers from how the concept was generated, how the original idea matured, the training, overcoming challenges with the language and military jargon, successes and failures, their contribution to the American war effort, and how professional encryption leaders view the program as a type of encryption.