Data deduplication. MD5 may be used to detect replicate documents by generating a hash for each file and evaluating the hashes. If two data files create the exact same hash, They are really most likely similar, allowing for for efficient knowledge deduplication. Collision vulnerability. MD5 is prone to collision attacks, https://taixiusunwin22108.humor-blog.com/33200135/new-step-by-step-map-for-what-is-md5-technology