Difference between Bday attack and preimage attack?
I'm so confused... can someone please explain to me the difference between a birthday attack and a preimage attack?
Both of their definitions sounds exactly the same to me.
Both of their definitions sounds exactly the same to me.

Comments
Hash cracked - The H Security: News and Features
So from what dynamik is saying, the birthday attack is just the model and the preimage attack is the attack. They shouldn't have put the word "attack" in "birthday attack" if its not really an attack... It confused the heck out of me.
It seems like the differentiation in this context is that with the birthday attack, you only need to find two messages that produce the same hash while in the pre-image attack you have to find on hash that matches another specific hash.
The imaginary hash algorithm Techexam10 is the industry standard hash algorithm when used to verify the integrity of a forensic image. A suspect is accused of sending an email to a coworker threatening her life. The prosecution extracts the message from a forensic image of the suspect's machine.
Fast forward to the trial...
The suspect's attorney shows that their experts have been able to successfully create a collision using the Techexam10 algorithm using two files of similar sizes as the forensic image with minimal time, money, and minimal computing power. They present these findings in court stating that the integrity of the forensic image cannot be trusted due to the above, so the evidence extracted from the image should not be trusted either.
Let's ignore whether or not this would be a successful argument and instead look at what has occurred. The defense has been able to successfully tarnish the integrity of the Techexam10's algorithm using a birthday attack. It may not be an attack in the same way we see think of a DoS attack, but it is still an attack on the integrity the algorithm is providing.
With a preimage attack, think of something like 0phtcrack. You have the hash value of the password and you are attempting to find another password that produces the same hash value. This may or may not be the password that was used, but it is a password that produces the same hash value.
Hope this helps!