which one of the following cipher technologies? seenagape 10 years ago The birthday attack is MOST effective against which one of the following cipher technologies? A. Chaining block encryption B. Asymmetric cryptography C. Cryptographic hash D. Streaming cryptography ← Previous question Next question →