This report delves into the realm of hashing techniques, specifically comparing MD5 and SHA3 algorithms. It begins with an introduction to cryptography and the importance of hashing in securing data transmission. The report then provides detailed descriptions of both MD5 and SHA3, including their functionalities, advantages, and disadvantages. MD5, a widely used algorithm, is examined for its role in data integrity verification and digital signatures, while SHA3, the latest in the SHA family, is presented for its enhanced security features. A comparative analysis highlights the key differences between the two techniques, considering factors such as output size, internal state size, and security against collision attacks. The report concludes by evaluating the suitability of each algorithm for data-oriented companies, helping readers make informed decisions about which hashing technique best suits their security needs. Desklib is a platform offering students access to past papers and solved assignments to aid in their studies.