Sadly, it might with MD5. Actually, again in 2004, researchers managed to develop two diverse inputs that gave a similar MD5 hash. This vulnerability is usually exploited by poor actors to sneak in destructive info. The final 64 bits in the padded message depict the size of the first concept https://emilianoprrqp.win-blog.com/14840815/what-is-md5-technology-an-overview