Hashing and Authentication Threats

Hashing and Authentication Threats

Prompt: Explain the threat in each of the following types of authentication and provide a solution for each scenario below:

Alice sends a password, and Bob compares it against a database of passwords. ï‚·
Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords. ï‚·
Alice computes the hash of a password and uses it as secret key in challenge/response protocol. ï‚·
Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of doubly-hashed passwords.

 

Order from us and get better grades. We are the service you have been looking for.