After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be
useful to gain access to the application?
A. SHA1
B. Diffie-Helman
C. RSA
D. AES
After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be
useful to gain access to the application?
A. SHA1
B. Diffie-Helman
C. RSA
D. AES