Suppose that Bob is a client that connects to Alice, which is an SSL server. Assume Bob creates a message = EB (rec, H(rec, MB)) and sends it to Alice. How does Alice process the arrived message? Does this system provide confidentiality? What about message integrity? What about sender authentication? Justify your answers. H is a crypto hash function and rec is an SSL record. Describe two possible attacks that might happen in this system and the way you can prevent those attacks.