• Natanael@slrpnk.net
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    3 months ago

    That’s a second pre-image attacks when you’re targeting existing state (attacking hash values of existing data by creating a second file matching it). For some reason even with MD5 that’s still infeasible - but collision attacks where you don’t have a target output value, but instead have partial target inputs which need to have the same output hash, are however practical and fast.