fig2-2_hashes-of-weak-passwords