Data transformation within the MD5 hashing algorithm

What is the length of the hash value produced by the MD5 algorithm?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which of the following is a known vulnerability of the MD5 algorithm?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

In which year was the MD5 algorithm publicly released?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which of the following best describes the main weakness of MD5?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which cryptographic hash function is recommended as a secure alternative to MD5?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What is the primary purpose of a cryptographic hash function like MD5?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation