INSTRUCTIONS:
Week 2: Discussion - Cryptographic Hashing: How are digital hashes protected? Although cryptographic hashing can deliver integrity of evidence, there is no secret as part of the process. As a result, the ability to change the content of data, and then re-hash the modified content is possible. Therefore, how are digital hashes protected today from this simple attack and how might we improve this in the future with either a high-tech or low-tech solution?