For these so-termed collision attacks to work, an attacker should be equipped to control two separate inputs inside the hope of inevitably finding two independent combinations which have a matching hash.Main Compression Functionality: Each individual block with the concept goes through a compression functionality that updates the condition variable