What do most attacks on hash functions involve?%0D%0A%0D%0AA. Finding Collisions%0D%0AB. Pre-generating millions of hashes and comparing them to the plain text that generates it. %0D%0AC. Really good random guessing.%0D%0A%0D%0A(2 points)%0D%0AResponses%0D%0A%0D%0AA and B%0D%0AA and B%0D%0A%0D%0AA and C%0D%0AA and C%0D%0A%0D%0AB and C

1 answer

A. Finding Collisions