1. In our design of a secure channel, we said that the message numbers must not repeat. What bad things can happen if the message numbers do repeat?
2. Modify the algorithms for the secure channel in this chapter to use the encrypt-then-authenticate order for encryption and authentication.