When different files produce the same hash
MD5 collisions can be generated in seconds on a laptop. Never use MD5 for security purposes. Use SHA-256 or SHA-3 for cryptographic hashing.
Two different files, same MD5 hash - first published by Wang et al. (2004)
Different input data → Same hash output
79054025255fb1a26e4bc422aef54eb4
Digital Signatures: If you can create a collision, you can make two documents with the same signature - one innocent, one malicious.
Certificate Attacks: Attackers created fake CA certificates by generating collisions with real certificates.
Integrity Checks: Malware can be hidden in files that have the same hash as legitimate files.
Solution: Always use SHA-256, SHA-3, or BLAKE3 for security-sensitive hashing.