Which of the following is susceptible to a birthday attack?
A.
Authentication
B.
Integrity
C.
Authorization
D.
Digital signature
Explanation:
Which of the following is susceptible to a birthday attack?
Which of the following is susceptible to a birthday attack?
A.
Authentication
B.
Integrity
C.
Authorization
D.
Digital signature
Explanation: