What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature?
A. Birthday attacks
B. Password attacks
C. Session Hijacking
D. MIM attack
Answers
Answered by
0
The answer is option (A) Birthday attacks
Similar questions