Problem:
Question 1- List three approaches to message authentication.
Question 2- What is a message authentication code?
Quetion 3- What properties must a hash function have to be useful for message authentication?
Provide a brief explanation for your answer.