Yes. MD5 has been completely broken from a security perspective, but the probability of an accidental collision is still vanishingly small. Just be sure that the files aren’t being created by someone you don’t trust and who might have malicious intent.
More Related Contents:
- Is it possible to decrypt MD5 hashes?
- Is there an MD5 Fixed Point where md5(x) == x?
- How come MD5 hash values are not reversible?
- Is calculating an MD5 hash less CPU intensive than SHA family functions?
- Can two different strings generate the same MD5 hash code?
- How are hash functions like MD5 unique?
- How can it be impossible to “decrypt” an MD5 hash? [duplicate]
- Is it possible to decrypt MD5 hashes?
- Are mutable hashmap keys a dangerous practice?
- Calculate MD5 checksum for a file
- How does password salt help against a rainbow table attack?
- Salting Your Password: Best Practices? [closed]
- Is it safe to ignore the possibility of SHA collisions in practice?
- Probability of SHA1 collisions
- Are there any SHA-256 javascript implementations that are generally considered trustworthy? [closed]
- How to generate an MD5 file hash in JavaScript/Node.js?
- Possible to calculate MD5 (or other) hash with buffered reads?
- MD5 hash with salt for keeping password in DB in C#
- How can I read/stream a file without loading the entire file into memory?
- When is CRC more appropriate to use than MD5/SHA1?
- How long to brute force a salted SHA-512 hash? (salt provided)
- How do I create an MD5 Hash of a string in Cocoa?
- md5 decoding. How they do it?
- Simple (non-secure) hash function for JavaScript? [duplicate]
- Why are XOR often used in java hashCode() but another bitwise operators are used rarely?
- Why not use MD5 for password hashing?
- How to “EXPIRE” the “HSET” child key in redis?
- Why are 5381 and 33 so important in the djb2 algorithm?
- php: number only hash?
- Best practice for hashing passwords – SHA256 or SHA512?