For these so-known as collision attacks to operate, an attacker should be in a position to govern two separate inputs inside the hope of ultimately getting two separate combos that have a matching hash.Now, let us go forward to applying MD5 in code. Take note that for simple applications, it is recommended to work with much better hashing algorithm