Discussion:
Q1 A client/server system requires remote users to use a password to log onto the server. Describe a simple scheme that would thwart eavesdroppers from obtaining and/or spoofing the password.
Q2 Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?
Q3 Invent a simple hash function. Identify its weaknesses.