Hunting again at the diagram over again, once we trace the traces onward, we see that the results of our remaining change goes to a different modular addition box.While MD5 and SHA can be used with salts, they do not include things like key stretching, which can be a important aspect for securely hashing passwords. Important stretching boosts the c