Which of the following is most suitable to secure passwords?
(1)Non-repudiation
(2)Encryption
(3)Authorization
(4)Authentication