1. Unlike PEM, PGP requires the user to set a flag to indicate whether the file being protected is text or binary data. Explain why such a flag is necessary. Why does PEM not require such a flag?
2. Redraw Figure 11-6 assuming that the SA between frauds and equity is a transport mode SA rather than a tunnel mode SA.