Attack Scenarios
Many applications of crytographic hash functions do not rely on collision resistance, thus collision attacks do not affect their security. For example, HMACs are not vulnerable. For the attack to be useful, the attacker must be in control of the input to the hash function.
Read more about this topic: Collision Attack
Famous quotes containing the words attack and/or scenarios:
“It is well worth the efforts of a lifetime to have attained knowledge which justifies an attack on the root of all evilviz. the deadly atheism which asserts that because forms of evil have always existed in society, therefore they must always exist; and that the attainment of a high ideal is a hopeless chimera.”
—Elizabeth Blackwell (18211910)
“The taste for worst-case scenarios reflects the need to master fear of what is felt to be uncontrollable. It also expresses an imaginative complicity with disaster.”
—Susan Sontag (b. 1933)