For these so-known as collision attacks to work, an attacker really should be capable to control two independent inputs in the hope of eventually locating two independent combinations which have a matching hash. One method to enrich the security of MD5 is by using a technique named 'salting'. That is https://myleslhaup.blogginaway.com/34706285/what-is-md5-technology-can-be-fun-for-anyone