which one of the following cipher technologies? seenagape 9 years ago The birthday attack is MOST effective against which one of the following cipher technologies? A. Chaining block encryption B. Asymmetric cryptography C. Cryptographic hash D. Streaming cryptography ← Previous question Next question →