Tutorial on Coding Theory and Data Integrity (Part 3, Applied Cryptology)