Problem
1. Explain how Bob finds out what cryptographic algorithms Alice has used when he receives a PGP message from her.
2. Explain how Bob finds out what cryptographic algorithms Alice has used when he receives an S/MIME message from her.
3. In POP, explain how Bob and Alice exchange the secret key for encrypting messages.