Question: 22
Which of the following statements about hashing in cybersecu...
A software development company uses the Message Digest 5 (MD5) hashing algorithm to generate digital signatures for their software releases. Recently, security researchers have demonstrated the ability to create two different executable files that produce the same MD5 hash. An attacker aims to exploit this vulnerability to distribute a malicious version of the software that appears legitimate by matching the original digital signature.
Which type of cryptographic vulnerability is the attacker most likely exploiting to create a malicious software version with a matching MD5 hash?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!