Unfortunately, it can with MD5. In truth, back in 2004, researchers managed to develop two different inputs that gave a similar MD5 hash. This vulnerability might be exploited by poor actors to sneak in destructive information. It was made by Ronald Rivest in 1991 and is usually used for knowledge https://tai-xiu-sunwin09775.blogs100.com/34061519/top-guidelines-of-what-is-md5-technology