22.11.2017, 10:41
(
Последний раз редактировалось BigETI; 22.11.2017 в 11:51.
)
Cryptographic hash algorithms are designed to calculate completly obfuscated hashes, where calculating back is literally impossible. Also small changes to the input needs to create a completly different hash. If none of these criteria is fulfilled, it cannot be used for password validity checks.