Which type of cryptographic attack exploits the iscc video

 ·  PT1H46M27S  ·  EN

cc video for which type of cryptographic attack exploits the probability of hash collisions to find two different inputs that produce the same hash value?

Full Certification Question

Which type of cryptographic attack exploits the probability of hash collisions to find two different inputs that produce the same hash value?