By mid-2004, an analytical assault was finished in just an hour which was able to generate collisions for the full MD5. Now, let us move ahead to implementing MD5 in code. Note that for useful needs, it is suggested to implement much better hashing algorithms like SHA-256 instead of MD5. https://tai-xiu-sunwin51739.ja-blog.com/33656612/the-2-minute-rule-for-what-is-md5-technology