An attack against Secret Suffix MAC. Involves finding a Hash Collision between the original messages. Hash(M1)=Hash(M2)⟹MACkey(M1)=MACkey(M2) https://eitca.org/cybersecurity/eitc-is-acc-advanced-classical-cryptography/message-authentication-codes/mac-message-authentication-codes-and-hmac/examination-review-mac-message-authentication-codes-and-hmac/what-are-the-weaknesses-of-the-secret-prefix-and-secret-suffix-methods-for-constructing-macs/