By mid-2004, an analytical attack was completed in only an hour that was in a position to generate collisions for the entire MD5. SHA-1 can however be utilized to verify outdated time stamps and electronic signatures, however the NIST (National Institute of Expectations and Technology) would not advise using SHA-1 https://evansk059tng7.wikiadvocate.com/user