Problem 1 system must keep copy of secret, to check against password. What if malicious user gains access to this list of passwords?
Encryption Transformation on data that is difficult to reverse - in particular, secure digest functions.