What do most attacks on hash functions involve?
1. Finding collisions
2. Pre-generating millions of hashed and comparing them to the plain text that generates it
3. Replay good random guessing
A. 1 and 2
B. 1 and 3
C. 2 and 3
1 answer
A. 1 and 2