79447473

Date: 2025-02-18 07:50:36
Score: 2
Natty:
Report link

No, an attacker cannot simply modify data and send it along with the hash for the modified data because a fundamental property of cryptographic hash functions is that even a tiny change in the original data will result in a significantly different hash value, making it readily detectable if the recipient recalculates the hash on the received data and compares it to the original hash

Reasons:
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Malph Bar