It’s not a collision attack though; the person has to control both long key IDs.
Let me know when they can generate a collision against a known ID.
Questions, answers, discussions, and literature on the theory and practice of cryptography
Rules (longer version here)
##Related resources;
It’s not a collision attack though; the person has to control both long key IDs.
Let me know when they can generate a collision against a known ID.
That IS a collision attack
You're talking about first preimage