Most attacks on hash functions involve:
A. Finding collisions.
B. Pre-generating millions of hashes and comparing them to the plain text that generated it.
C. Really good random guessing.
1 answer
A. Finding collisions.
A. Finding collisions.
B. Pre-generating millions of hashes and comparing them to the plain text that generated it.
C. Really good random guessing.
1 answer