Learning Goal: I’m working on a computer science question and need support to help me learn.
Using everything you learned throughout the subject, read the closing portions of chapter 11 in your textbook. Review the section on The Hash Tree Engine, and respond to the questions below. Post your detailed analysis answering the questions below in the discussion board of this week.
What happens when Hash 1 and Hash 2 do not match?
Is this necessarily good or bad, and why?
What controls are needed to prevent that authentication of incorrect information?