Notifications
Clear all
Topic starter
03/11/2022 5:17 am
The birthday attack is MOST effective against which one of the following cipher technologies?
- A . Chaining block encryption
- B . Asymmetric cryptography
- C . Cryptographic hash
- D . Streaming cryptography
Suggested Answer: C