Consider a hash function collision resistant or strong collision resistant if it is computationally infeasible to find two different inputs x1 ≠ x2 with h(x1) = h(x2).In a communication between Alice and Bob, Find out how Oscar an attacker could turn his ability to find collisions into an attack by altering 2 input messages, x1and x2 . Provide a diagram to support your answer.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here