List two disputes that can arise in the context of message authentication.
2. What are the properties a digital signature should have?
3. In what order should the signature function and the confidentiality function be applied to a message?
4. List thre general approaches to dealing with replay attacks.
5. Find one certification authority’s certificate on your computer browser. Print the screenshots.