A hash of data can be identified with _______ attacks, so it is customary to add ________ to a hash to ensure that the hash value appears to be different each time it is used. a. dictionary; a salt b. brute force; encryption c. dictionary; an RSA key d. brute force; a Diffie-Hellman key