An attack on Hashing Algorithms that involves finding the raw messages that generate a specific hash.

A robust algorithm should resist all attacks on its Inverse Image