In 2008, researchers were being ready to make a rogue SSL certification that gave the impression to be signed by a trusted certificate authority. They exploited MD5’s collision vulnerabilities to accomplish this, highlighting the hazards of using MD5 in safe communication. Though MD5 and SHA can be used with salts, https://lanekfyri.bloggactif.com/34888697/an-unbiased-view-of-what-is-md5-s-application