this post was submitted on 07 Jan 2026
8 points (100.0% liked)

Cryptography @ Infosec.pub

581 readers
4 users here now

Questions, answers, discussions, and literature on the theory and practice of cryptography

Rules (longer version here)

##Related resources;

founded 2 years ago
MODERATORS
top 2 comments
sorted by: hot top controversial new old
[–] adespoton@lemmy.ca 0 points 4 days ago (1 children)

It’s not a collision attack though; the person has to control both long key IDs.

Let me know when they can generate a collision against a known ID.

[–] Natanael@infosec.pub 3 points 4 days ago

That IS a collision attack

You're talking about first preimage

https://en.wikipedia.org/wiki/Preimage_attack