Explain how one or more of authentication, hashing and/or types of encryption are used to ensure each of the following: 1. Only club members can log on to the website using a user name and password. 2. The club website editor can verify that an article on how to grow sweet peas is from Alicia Keyton (and not a hacker, Sam).

Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter8: Cryptography
Section: Chapter Questions
Problem 18RQ
icon
Related questions
Question
a. The Green and Golden Gardener's club in Milton
Keynes has a website for club members. The club
sends out news items and seasonal hints and
members are allowed to contribute. Members
receive a discount from subscription fees if they
contribute 'star' articles. Members sign their
articles using their own private key. Alicia Keyton
is a new member.
Explain how one or more of authentication,
hashing and/or types of encryption are used to
ensure each of the following:
1. Only club members can log on to the
website using a user name and password.
2. The club website editor can verify that an
article on how to grow sweet peas is from
Alicia Keyton (and not a hacker, Sam).
The maximum word count for part a. is 140 words.
Transcribed Image Text:a. The Green and Golden Gardener's club in Milton Keynes has a website for club members. The club sends out news items and seasonal hints and members are allowed to contribute. Members receive a discount from subscription fees if they contribute 'star' articles. Members sign their articles using their own private key. Alicia Keyton is a new member. Explain how one or more of authentication, hashing and/or types of encryption are used to ensure each of the following: 1. Only club members can log on to the website using a user name and password. 2. The club website editor can verify that an article on how to grow sweet peas is from Alicia Keyton (and not a hacker, Sam). The maximum word count for part a. is 140 words.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning