What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature?
A. Birthday attacks
B. Password attacks
C. Session Hijacking
D. MIM attack
Answers
Answered by
0
The answer is option (A) Birthday attacks
Similar questions
Physics,
7 months ago
Chemistry,
7 months ago
Computer Science,
1 year ago
Computer Science,
1 year ago