For these so-termed collision attacks to operate, an attacker must be capable to govern two independent inputs during the hope of ultimately locating two individual combinations which have a matching hash.It was designed by Ronald Rivest in 1991 which is generally accustomed to validate info integrity. Nonetheless, resulting from its vulnerability