In 2008, researchers were being capable to create a rogue SSL certification that appeared to be signed by a reliable certificate authority. They exploited MD5’s collision vulnerabilities to obtain this, highlighting the risks of using MD5 in safe communication. Electronic Certificates and Signatures: SHA-256 is used in different electronic certificates https://tai-xiu-online39627.weblogco.com/33757011/the-basic-principles-of-what-is-md5-s-application