Q. 13 A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
(A) (I) and (II) only
(B) (I) only
(C) (II) only
(D) (II) and (III) only
Answer: (B)
Explanation: