By mid-2004, an analytical attack was completed in just an hour or so which was in a position to create collisions for the entire MD5. Now, let's go forward to employing MD5 in code. Notice that for functional needs, it is suggested to employ much better hashing algorithms like SHA-256 https://ernief837oib5.wikijournalist.com/user