By mid-2004, an analytical attack was completed in just one hour that was ready to create collisions for the full MD5. append "1" little bit to information< // Notice: the input bytes are regarded as little bit strings, // where by the first little bit is the most significant bit https://sunwin29527.bloggerswise.com/40883057/top-guidelines-of-what-is-md5-technology