Collision Attack - Attack Scenarios

Attack Scenarios

Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.

Read more about this topic:  Collision Attack

Famous quotes containing the words attack and/or scenarios:

    One’s condition on marijuana is always existential. One can feel the importance of each moment and how it is changing one. One feels one’s being, one becomes aware of the enormous apparatus of nothingness—the hum of a hi-fi set, the emptiness of a pointless interruption, one becomes aware of the war between each of us, how the nothingness in each of us seeks to attack the being of others, how our being in turn is attacked by the nothingness in others.
    Norman Mailer (b. 1923)

    The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.
    Susan Sontag (b. 1933)