Attack Scenarios
Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.
Read more about this topic: Collision Attack
Famous quotes containing the words attack and/or scenarios:
“His spiritual life has been exaggerated by a chronic attack of mental gallstones.”
—Oliver St. John Gogarty (18781957)
“The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.”
—Susan Sontag (b. 1933)
Related Phrases
Related Words