what is md5 technology - An Overview
Preimage attacks. MD5 is vulnerable to preimage assaults, the place an attacker can find an enter that hashes to a particular value. This power to reverse-engineer a hash weakens MD5’s efficiency in guarding delicate details.Compact hash output. The 128-little bit hash value produced by MD5 is fairly compact, which happens to be beneficial in env