Discussion: Public-Key Cryptography And Message Authentication
i. List three approaches to message authentication.
ii. What is a message authentication code?
iii. What properties must a hash function have to be useful for message authentication?
iv. In the context of a hash function, what is a compression function?
v. What are the principal ingredients of a public-key cryptosystem?
vi. List and briefly define three uses of a public-key cryptosystem.
vii. What is the difference between a private key and a secret key?
viii. What is a digital signature?
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.