1. Describe the sequence of steps a sender of a message takes when sending the message with a digital signature. What steps does the receiver of such a message= take to recover the message?
2. Compare and contrast the problems and bene fits of KDC and PKI.
3. Describe the message authentication process using:
(a) Symmetric encryption
(b) Public-key encryption
(c) Hash function