Consider each situation in turn and for each say whether hashing, encryption or both would be...

80.2K

Verified Solution

Question

Programming

Consider each situation in turn and for each say whetherhashing, encryption or both would be applicable, and brieflyoutline how it would be used.

  1. A user logs in to an online shop.
  2. A user shares a document with another person over a network.The document is not confidential, but the parties involved want tobe able to check the document has not been accidentally corruptedon route.
  3. A user shares a document with another person over a network andwants to be able to 'sign' it, so the recipient can be sure who thedocument came from

Answer & Explanation Solved by verified expert
3.8 Ratings (435 Votes)
hashing converts data of any length to a fixed length oneway helps in checking the authenticity of the data transferred encryption converts data into unreadable format twoway helps in protecting the data transferred from unintended receivers 1 A user logs    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students