Attack against cryptographical hash functions, where knowing Hash(message₁) and the length of message₁ allows an attacker to calculate Hash(message₁ ‖ message₂) for an attacker-controlled message₂
attack against cryptographical hash functions, where knowing Hash(message₁) and the length of message₁ allows an attacker to calculate Hash(message₁ ‖ message₂) for an attacker-controlled message₂ (en)