MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used. What is the difference between a one way hash value
and other cryptographic functions? Why is a "salt" important?
After posting your discussion, you must respond to at least two peers.
Sample Solution