Assignment: Network Security
1. List three approaches to message authentication.
2. What is a message authentication code?
3. What properties must a hash function have to be useful for message authentication?
4. In the context of a hash function, what is a compression function?
5. What are the principal ingredients of a public-key cryptosystem?
6. List and briefly define three uses of a public-key cryptosystem.
7. What is the difference between a private key and a secret key?
8. What is a digital signature?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.