Attack Scenarios
Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.
Read more about this topic: Collision Attack
Famous quotes containing the words attack and/or scenarios:
“And whether it is Thursday, or the day is stormy,
With thunder and rain, or the birds attack each other,
We have rolled into another dream.”
—John Ashbery (b. 1927)
“The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.”
—Susan Sontag (b. 1933)
Main Site Subjects
Related Phrases
Related Words