Showing results for let us consider a case where the user send the text or file from his phone to his friend the risk of the data being accessed by the third party is high when the data enters the cloud platform.Hence a new method to secure the messages/file is to be done either by building a new algorithm or by modifying the existing one which can give more security and consume less time.the identity of the user must also be verified by using the authentication,verification and validation methodologies..1)task-1: try to build or change an existing algorithm to secure message send by the user based on efficiency.. 2)task-2: confirm the identity of the user by entity authentication using verification and validation.Contestant should be use python and ML to perform this task. Search instead for let us consider a case where the user sewnd the text or file from his phone to his friend the risk of the data being accessed by the third party is high when the data enters the cloud platform.Hence a new method to secure the messages/file is to be done either by building a new algorithm or by modifying the existing one which can give more security and consume less time.the identity of the user must also be verified by using the authentication,verification and validation methedologies..1)task-1: try to build or change an existing algorithm to secure message send by the user based on efficiency.. 2)task-2: confirm the identity of the user by entity authentication using verification and validation.Contestant should be use python and ML to perform this task.