Which attack requires the least effort/computations?
(a) Pre-image
(b) Second Pre-image
(c) Collision
(d) All required the same effort
This question was posed to me by my school teacher while I was bunking the class.
This intriguing question comes from Hash Functions Based on Cipher Block Chaining in portion Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security