Present the method and explain why the approach


Consider the following three approaches to managing integrity. 
a. A one-way hash of the data item is computed and stored with the item. 
b. The item is encrypted with the private key of the writer. 
c. The item is encoded using an error-correcting code (e.g., Hamming code). 
For each, (1) present the method and explain why the approach can be used to manage the integrity, (2) give an example of a type of attack where the method does provide integrity, and (3) give an example of a type of attack where the integrity is suspect.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Present the method and explain why the approach
Reference No:- TGS0100675

Expected delivery within 24 Hours