| Source | ‣ |
|---|---|
| Target | 60% |
| Goal | - MD5 |
In summary, while MD5 and SHA-1 have significant vulnerabilities and are not recommended for security purposes, SHA-256, SHA-384, Scrypt, and Bcrypt offer better security features. Scrypt and Bcrypt, in particular, provide additional protection against brute-force attacks through their intentional slowness and adaptive features.