top of page

IT 549 3-2 Scenario Assignment Module Three: Hashing and Authentication Threats


Instructions

Explain the threat in each of the following types of authentication and provide a solution for each scenario below:

  • Alice sends a password, and Bob compares it against a database of passwords.

  • Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.

  • Alice computes the hash of a password and uses it as secret key in challenge/response protocol.

  • Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of doubly-hashed passwords.

For additional details, please refer to the Scenario Assignment Module Three Guidelines and Rubric document.

Recent Posts

See All

SNHU HSE-101-X5387 Introduction to Human Services 23EW5

Title: Navigating HSE-101-X5387: A Comprehensive Guide to the Introduction to Human Services Course Are you currently enrolled in HSE-101-X5387, the Introduction to Human Services course at Southern N

Комментарии


bottom of page