Consider the following three approaches to managing integrity.
a. A one-way hash of the data item is computed and stored with the item.
b. The item is encrypted with the private key of the writer.
c. The item is encoded using an error-correcting code (e.g., Hamming code).
For each, (1) present the method and explain why the approach can be used to manage the integrity, (2) give an example of a type of attack where the method does provide integrity, and (3) give an example of a type of attack where the integrity is suspect.