In 2008, scientists were ready to create a rogue SSL certification that appeared to be signed by a trustworthy certification authority. They exploited MD5’s collision vulnerabilities to accomplish this, highlighting the dangers of applying MD5 in protected conversation. The MD5 algorithm has been popular before to crypt passwords in databases. https://nohu88763.blogolenta.com/30561294/what-is-md5-s-application-can-be-fun-for-anyone