Which of the following techniques is used to transmit passwords during authentication?