For these so-named collision attacks to work, an attacker needs to be equipped to govern two different inputs from the hope of finally acquiring two individual mixtures that have a matching hash. append "1" little bit to information< // See: the enter bytes are considered as little bit strings, // https://henryx851czx4.anchor-blog.com/profile