During a routine security audit, the auditor discovers that two different archived log files generate the same hash value despite having different contents. Which of the following type of attack might have occurred?
Collision attack
Key exchange method
Password entropy
Hashing algorithm speed