These are just one-way capabilities – Which suggests that it is unfeasible to use the hash value to figure out what the original input was (with existing technology and strategies). Collision vulnerability. MD5 is at risk of collision assaults, in which two distinct inputs produce exactly the same hash value. https://troyjexrm.blogdemls.com/33445964/what-is-md5-technology-an-overview