Q1 A client/server system requires remote users to use a password to log onto the server. Describe a simple scheme that would thwart eavesdroppers from obtaining and/or spoofing the password.
A1. unknown
Q2 Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?
A2. The hash value of the modified file would look entirely different than the original hash value.
Q3. Invent a simple hash function. Identify its weaknesses.
A3. Unknown
V/R