Which of the following is susceptible to a birthday attack?

Which of the following is susceptible to a birthday attack?

Which of the following is susceptible to a birthday attack?

A.
Authentication

B.
Integrity

C.
Authorization

D.
Digital signature

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *