Though it has some vulnerabilities and is not advisable for all applications, it continues to be a useful gizmo in several contexts.Notice that hash features usually do not use secrets (other than the keyed hash functions). All data that's made use of to produce a hash is in the general public area. The MD5 algorithm is described in RFC1321.K refer