Posted Mar 22, 2012 14:09 UTC (Thu) by rvfh (subscriber, #31018)
Parent article: Shadow hardening
> MD5, SHA-256, and SHA-512 encryption methods
I thought these were hashing methods. Is it correct to call them encryption methods? I know they somehow 'encrypt' the password, but I would not call them so, considering the encryption needs to be bijective, as the password can normally not be recovered from its hash.