MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used. What is the difference between a one way hash value and other cryptographic functions? Why is a “salt” important?
Remember to first post your point of view before responding to your classmates. You must respond to at least two classmates
6 points for your post, 2 points each for responses to classmates. The same standards apply here as to the Week 1 discussion