The most commonly used hashing algorithm is SHA-256 (Secure Hash Algorithm 256). It is widely used for cryptographic security and data integrity verification in various applications, including digital signatures, SSL/TLS certificates, and blockchain technology.
Vulnerabilities of MD5 (hash value is 128 bits)
1. Collision Vulnerabilities: MD5 is susceptible to collision attacks, where two different inputs produce the same hash. This poses a severe security risk, particularly in applications like digital signatures.
2. Preimage Attacks: Attackers can reverse-engineer the hash to find an input that matches a given MD5 hash, compromising data security.
3. Speed: The speed at which MD5 can generate hashes makes it susceptible to brute force attacks.
cf. https://medium.com/@techclaw/exploring-the-power-and-vulnerabilities-of-the-md5-algorithm-feb249ef9dfb#:~:text=MD5%20is%20susceptible%20to%20collision,in%20applications%20like%20digital%20signatures.