1. What bad things could happen if Alice uses the same keys with multiple PKIs?
2. Suppose a system employs devices that are each capable of storing a list of 50 CRL entries. How can this design decision lead to security problems?
3. Suppose a system uses a PKI with a CRL. A device in that system is asked to verify a certificate but cannot access the CRL database because of a denial-of-service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?