MD5 (Message Digest Algorithm 5) is one of the most well-known hash functions in computing history. Created by Ronald Rivest in 1991, it takes any input — a single character, a full document, or an entire file — and produces a fixed 128-bit (32-character hexadecimal) hash value. Despite being declared cryptographically broken over a decade ago, MD5 remains surprisingly common in 2026. Here is why.

How MD5 Works
A hash function is a one-way mathematical operation. You feed it data, and it outputs a fixed-length string called a digest. Key properties of hash functions include:
- Deterministic: The same input always produces the same output
- Fixed length: No matter the input size, the output is always 32 hex characters
- One-way: You cannot reverse-engineer the original input from the hash
- Avalanche effect: A tiny change in input produces a completely different hash
For example:
MD5("hello")5d41402abc4b2a76b9719d911017c592MD5("Hello")8b1a9953c4611296a827abf8c47804d7
Just capitalising the first letter produces a completely different hash. Try it yourself with our free MD5 Generator.
Why MD5 Is Considered Broken
In 2004, researchers demonstrated practical collision attacks against MD5 — meaning they could create two different inputs that produce the same hash. This was a fatal blow to MD5 for security purposes:
- Digital signatures: An attacker could forge a document with the same MD5 hash as a legitimate one
- Certificate verification: In 2008, researchers used MD5 collisions to create a rogue SSL certificate
- Password storage: MD5 password hashes can be cracked in seconds using rainbow tables and GPU-powered brute force
Bottom line: Never use MD5 for passwords, digital signatures, or any security-critical application. Use bcrypt for passwords, and SHA-256 or SHA-3 for integrity verification.
Where MD5 Is Still Useful in 2026
Despite its cryptographic weaknesses, MD5 remains widely used for non-security purposes where collision resistance is not critical:
1. File Integrity Checks
When downloading software, you often see an MD5 checksum listed alongside the download link. After downloading, you generate the MD5 hash of the file and compare it to the published hash. If they match, the file was not corrupted during transfer. MD5 is fast and perfectly adequate for detecting accidental corruption.
2. Data Deduplication
Storage systems and backup tools use MD5 hashes to quickly identify duplicate files. Comparing 32-character hashes is far faster than comparing entire file contents byte-by-byte.
3. Cache Keys and ETags
Web servers and CDNs use MD5 hashes as cache identifiers. When a file changes, its MD5 changes, signalling that the cached version is stale. HTTP ETags often use MD5 under the hood.
4. Database Indexing
Some databases use MD5 to create fixed-length keys from variable-length data, improving lookup performance in hash-based indexes.
5. Non-Critical Checksums in APIs
Many APIs still use MD5 for request signing or payload verification where the threat model does not include sophisticated attackers — for example, verifying that a webhook payload was not corrupted in transit.
MD5 vs SHA-1 vs SHA-256
| Algorithm | Output Length | Speed | Security |
|---|---|---|---|
| MD5 | 128 bits (32 chars) | Very fast | Broken (collisions found) |
| SHA-1 | 160 bits (40 chars) | Fast | Broken (collisions found 2017) |
| SHA-256 | 256 bits (64 chars) | Moderate | Secure (no known attacks) |
Generate and compare hashes yourself:
- MD5 Generator — 32-character hash, fastest option
- SHA-1 Generator — 40-character hash, legacy systems
- SHA-256 Generator — 64-character hash, recommended for security
The Takeaway
MD5 is not dead — it is just retired from security duty. For checksums, cache keys, and deduplication, it remains fast and practical. For anything involving security, move to SHA-256 or bcrypt. Use our free MD5 Generator whenever you need a quick hash for non-security purposes.