All we should do is move Every single little bit seven spaces towards the still left. We are going to do it with the intermediate step to really make it much easier to see what is going on: Recognize that hash functions don't use secrets (except the keyed hash capabilities). https://chancefaumf.blogsvirals.com/32791982/the-smart-trick-of-what-is-md5-s-application-that-nobody-is-discussing