For these so-termed collision attacks to operate, an attacker needs to be equipped to control two different inputs inside the hope of eventually obtaining two different combinations that have a matching hash.So while MD5 has its rewards, these weaknesses make it considerably less well suited for particular programs in the present earth. It's a bit