They're 1-way functions – Which means that it's unfeasible to utilize the hash price to determine what the initial input was (with current technology and techniques). Now, let's go forward to employing MD5 in code. Note that for practical applications, it is usually recommended to implement more robust hashing algorithms https://sunwin29506.ltfblog.com/32551557/new-step-by-step-map-for-what-is-md5-technology