After gaining access to the password hashes used to protect access to a web based application, knowledge of
which cryptographic algorithms would be useful to gain access to the application?
A.
SHA1
B.
Diffie-Helman
C.
RSA
D.
AES
After gaining access to the password hashes used to protect access to a web based application, knowledge of
which cryptographic algorithms would be useful to gain access to the application?
After gaining access to the password hashes used to protect access to a web based application, knowledge of
which cryptographic algorithms would be useful to gain access to the application?
A.
SHA1
B.
Diffie-Helman
C.
RSA
D.
AES