By now, try to be really familiar with how each of these equations work, so you should be able to compute them yourself if you would like. If you need to skip the exertions, the solutions are: Recognize that hash functions will not use secrets (except the keyed hash functions). https://garrettimrsu.blogpixi.com/33895856/the-definitive-guide-to-what-is-md5-s-application