Although MD5 is widely employed for its speed and simplicity, it has been observed to become prone to attack occasionally. In particular, researchers have found out strategies for building two distinct documents Together with the same MD5 digest, which makes it feasible for an attacker to produce a bogus file that matches the digest of the genuine