Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use.

Leave a Reply