Problem
a) If public key cryptography had never been invented, then how do you suppose electronic commerce would be done securely today?
b) Explain how Lamport's approach (S/KEY) to authentication over insecure networks is an example of a known-plaintext strength protocol.
c) What are some technical obstacles to collecting real-time data on a network to determine if a DDOS attack is occurring?