The Definitive Guide to what is md5 technology
By mid-2004, an analytical attack was done in only one hour that was ready to make collisions for the complete MD5.SHA-one can still be used to verify previous time stamps and electronic signatures, though the NIST (National Institute of Requirements and Technology) will not advocate applying SHA-1 to generate digital signatures or in situations