Hunting back again at the diagram over again, after we trace the strains onward, we see that the results of our still left shift goes to another modular addition box.While MD5 and SHA may be used with salts, they don't incorporate essential stretching, that's a vital characteristic for securely hashing passwords. Important stretching increases the