Problem
1. In a trivial (not secure) key exchange. p = 53. Find an appropriate value for g.
2. In station-to-station protocol, show that if the identity of the receiver is removed from the signature, the protocol becomes vulnerable to the man-in-the-middle attack.
3. Discuss the trustworthiness of root certificates provided by browsers.