1.

For an m-bit value, the adversary would have to try ____________ values to generates a given hash value h.

A. 2<sup>m</sup>
B. 2<sup>(m-1)</sup>
C. 2<sup>(m/2)</sup>
D. (2<sup>m</sup>) 1
Answer» C. 2<sup>(m/2)</sup>


Discussion

No Comment Found