Slide 1 Authentication Methods: From Digital Signatures to Hashes Slide 2 Lecture Motivation We have looked at confidentiality services, and also examined the information…