The cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .

A. collision resistant
B. pseudorandomness
C. preimage resistant
D. second preimage resistant

D. second preimage resistant

Computer Science & Information Technology

You might also like to view...

When a user opens a form, the first record in the underlying table is displayed in the ________ View

A) Layout B) Form C) Design D) Print

Computer Science & Information Technology

A running sum is a calculation that accumulates from field to field

Indicate whether the statement is true or false

Computer Science & Information Technology