What do most attacks on hash functions involve?
Finding Collisions
Pre-generating millions of hashes and comparing them to the plain text that generates it.
Really good random guessing.
A and B
A and C
B and C
1 answer
A and B