« The key is to try to make sure the energy to “break” the hashing exceeds the value that the perpetrators commonly gain from the doing this. » – Troy Appear
It’s not necessary to have Speed
Considering down dating username Jeff Atwood, « hashes, when employed for cover, must be slow. » Good cryptographic hash means employed for code hashing has to be sluggish to compute as a rapidly computed algorithm could make brute-force episodes so much more feasible, particularly with the easily changing stamina of modern resources.