For these so-identified as collision attacks to operate, an attacker should be able to govern two independent inputs during the hope of at some point locating two separate combinations that have a matching hash. append "one" little bit to message< // Notice: the input bytes are considered as little bit https://marcojzmao.angelinsblog.com/32734976/what-is-md5-technology-no-further-a-mystery