For these so-named collision assaults to operate, an attacker really should be able to manipulate two separate inputs within the hope of at some point acquiring two individual combos which have a matching hash. append "1" bit to concept< // Recognize: the enter bytes are considered as bit strings, // https://shanezejmo.howeweb.com/34922503/the-smart-trick-of-what-is-md5-technology-that-nobody-is-discussing