Question: 1. In what ways can a hash value be secured so as to provide message authentication?
2. Elaborate on the applications, weaknesses and limitations of the hashing algorithms
The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format.