Hash Functions
suggest changeRemarks
MD5 and SHA1 are insecure and should be avoided. The examples exist for educational purposes and due to the fact that legacy software may still use these algorithms.
Found a mistake? Have a question or improvement idea?
Let me know.
Table Of Contents