MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used.  What is the difference between a one way hash value and other cryptographic functions? Why is a “salt” important?

Remember to first post your point of view before responding to your classmates. You must respond to at least two classmates

6 points for your post, 2 points each for responses to classmates.  The same standards apply here as to the Week 1 discussion