An attack that involves finding inputs that create the same hash, to find flaws within hashing algorithms.

Can be used to embed malicious documents with percieved secure hashes.