1 List two disputes that can arise in the context of message authentication.
2 What are the properties a digital signature should have?
3 What requirements should a digital signature scheme satisfy?
4 What is the difference between direct and arbitrated digital signature?
5 In what order should the signature function and the confidentiality function be applied to a message, and why?
1 What are some threats associated with a direct digital signature scheme?
2 List ways in which secret keys can be distributed to two communicating parties.
3 What is the difference between a session key and a master key?
4 What is a nonce?
5 What is a key distribution center?