Practical demonstration of MD5 and SHA-1 hash collision attacks using PDF files. Two visually different documents produce identical hash values, proving these algorithms are cryptographically broken.