What is a birthday attack in cryptography?

D5 ยท Crypto  ยท  CompTIA Security+ SY0-701
A birthday attack exploits the birthday paradox โ€” the surprising probability that in a group of 23 people, two share a birthday (50% chance). Applied to cryptography, it finds two different inputs that produce the same hash output (a collision).

A collision attack against a hash function undermines its integrity guarantees โ€” an attacker could substitute a malicious document with the same hash as a legitimate one.

Why MD5 and SHA-1 are broken: collision attacks have been demonstrated against both.
Birthday attacks target hash functions, not encryption. Defense: use longer hash outputs (SHA-256 or higher). A 128-bit hash has effective collision resistance of 64 bits due to the birthday bound. SHA-256 provides 128 bits of collision resistance.
โ† Back to Glossary Practice Questions โ†’