For these so-named collision attacks to work, an attacker needs to be equipped to govern two individual inputs inside the hope of at some point discovering two different combos that have a matching hash. append "one" little bit to information< // Notice: the input bytes are considered as bit strings, https://manueldkovl.worldblogged.com/39612582/little-known-facts-about-what-is-md5-technology