1. Distinguish message authentication and entity authentication.
2. Alice signs the message she sends to Bob to prove that she is the sender of the message. Which of the following keys does Alice need to use?
a. Alice's public key
b. Alice's private key