By mid-2004, an analytical attack was finished in just one hour which was in a position to make collisions for the total MD5.append "1" bit to conceptThe MD5 hash algorithm authenticates messages by developing a special identifier or “digital fingerprint” for the file. It then verifies this one of a kind fingerprint when the message is received