Hash Functions

suggest change


MD5 and SHA1 are insecure and should be avoided. The examples exist for educational purposes and due to the fact that legacy software may still use these algorithms.

Feedback about page:

Optional: your email if you want me to get back to you:

Table Of Contents