Regrettably, it could with MD5. In actual fact, back in 2004, scientists managed to develop two diverse inputs that gave exactly the same MD5 hash. This vulnerability can be exploited by lousy actors to sneak in malicious data.append "1" bit to message. To be a hash function, MD5 maps a set of data to a tad string of a set dimensions known as the h… Read More