Discussion Post
A. List three approaches to message authentication.
B. What is a message authentication code?
C. What properties must a hash function have to be useful for message authentication?
D. In the context of a hash function, what is a compression function?
E. What are the principal ingredients of a public-key cryptosystem?
F. List and briefly define three uses of a public-key cryptosystem.
G. What is the difference between a private key and a secret key?
H. What is a digital signature?
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.