Collision Attack - Attack Scenarios

Attack Scenarios

Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.

Read more about this topic:  Collision Attack

Famous quotes containing the words attack and/or scenarios:

    I make this direct statement to the American people that there is far less chance of the United States getting into war, if we do all we can now to support the nations defending themselves against attack by the Axis than if we acquiesce in their defeat, submit tamely to an Axis victory, and wait our turn to be the object of attack in another war later on.
    Franklin D. Roosevelt (1882–1945)

    The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.
    Susan Sontag (b. 1933)