Data transformation within the MD5 hashing algorithm
What is the length of the hash value produced by the MD5 algorithm?
Which of the following is a known vulnerability of the MD5 algorithm?
In which year was the MD5 algorithm publicly released?
Which of the following best describes the main weakness of MD5?
Which cryptographic hash function is recommended as a secure alternative to MD5?
What is the primary purpose of a cryptographic hash function like MD5?