Consider the following three approaches to managing integrity.
a. A one-way hash of the data item is computed and stored with the item.
b. The item is encrypted with the private key of the preparer.
c. The item is encoded using an error-correcting code (e.g., Hamming code).
For each, (1) present the method and describe why the approach can be used to manage the integrity, (2) give an ex of a type of attack where the method does provide integrity, and (3) give an ex of a type of attack where the integrity is suspect.