Some might wonder why we build custom security algorithms for us customers. There are two types of encryption
either symmetrical (can be decrypted) or asymmetrical (once encrypted they cannot be decrypted). Many people believe that when they use security encryption systems like MD5 and SHA their hash
encrypted items cannot be decrypted. While it is technically impossible to decrypt the hashed strings, there are sites that have dictionaries with millions of hashed codes and their string
equivalents. These dictionaries allow people to put in a hash code and it will look the value up in a database and find the password. Clever and it makes these standards insecure.