Attack Scenarios
Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.
Read more about this topic: Collision Attack
Famous quotes containing the words attack and/or scenarios:
“... possibly there is no needful occupation which is wholly unbeautiful. The beauty of work depends upon the way we meet itwhether we arm ourselves each morning to attack it as an enemy that must be vanquished before night comes, or whether we open our eyes with the sunrise to welcome it as an approaching friend who will keep us delightful company all day, and who will make us feel, at evening, that the day was well worth its fatigues.”
—Lucy Larcom (18241893)
“The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.”
—Susan Sontag (b. 1933)