7While some weaknesses have been found with MD5 hashing, it is still far superior to anything I could ever develop. So, ignoring pathological users who are just trying to break the system, the MD5 checksum should be sufficient.