In 2008, scientists were ready to produce a rogue SSL certificate that seemed to be signed by a trustworthy certification authority. They exploited MD5’s collision vulnerabilities to obtain this, highlighting the risks of using MD5 in protected communication.In case you recall what we discussed Firstly from the enter M segment, each 512 block of