explain the threat in each of the following types of authentication and provide a solution for scenario below:

Project Description:

explain the threat in each of the following types of authentication and provide a solution for each scenario below:
1.alice sends a password, and bob compares it against a database of passwords.
2.alice sends a password, and bob hashes it and compares it against a database of hashed passwords.
3.alice computes the hash of a password and uses it as secret key in challenge/response protocol.
4.alice computes the hash of a password and sends it to bob, who hashes it and compares it against a database of doubly-hashed passwords.
for additional details, each question should contain 2 paragraphs each paragraph should contain 5 lines.apa format..note : there should be citations and references and also turnitin free ..time:within 1 hour
Skills Required:
Project Stats:

Price Type: Fixed

Project Budget: $0 to $10
Completed
Total Proposals: 2
1 Current viewersl
40 Total views
Project posted by:

Proposals

Proposals Reputation Price offered