Which one of the following options is the attack that can be used to find collisions in a cryptographic hash function?