Cryptography

MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used. What is the difference between a one way hash value

and other cryptographic functions? Why is a "salt" important?

After posting your discussion, you must respond to at least two peers.

Sample Solution