ISC Exam Questions

which one of the following cipher technologies?

The birthday attack is MOST effective against which one of the following cipher technologies?

A.
Chaining block encryption

B.
Asymmetric cryptography

C.
Cryptographic hash

D.
Streaming cryptography