A cryptographic hash function should have a unique ____________________ for any two different input streams.
Fill in the blank(s) with the appropriate word(s).
message digest
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
message digest