Companies and organizations that store important data such as user passwords store the data as 'hash values' that can only be converted in one direction by cryptographic hash functions, rather than ...