The birthday attack is MOST effective against which one of the following cipher technologies?

The birthday attack is MOST effective against which one of the following cipher technologies?
A . Chaining block encryption
B . Asymmetric cryptography
C . Cryptographic hash
D . Streaming cryptography

Answer: C

Latest CISSP Dumps Valid Version with 981 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments